@blamejs/exceptd-skills 0.13.5 → 0.13.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "_meta": {
3
3
  "schema_version": "1.0.0",
4
- "last_updated": "2026-05-13",
4
+ "last_updated": "2026-05-18",
5
5
  "source": "NVD + CISA KEV + vendor advisories — see sources/index.json",
6
6
  "required_fields": [
7
7
  "type",
@@ -55,7 +55,7 @@
55
55
  "ai_discovery_methodology": {
56
56
  "field_added": "2026-05-15",
57
57
  "agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
58
- "current_rate": 0.132,
58
+ "current_rate": 0.1791,
59
59
  "current_floor_enforced_by_test": 0.13,
60
60
  "ladder_to_target": [
61
61
  0.13,
@@ -3657,5 +3657,1967 @@
3657
3657
  "_draft": false,
3658
3658
  "last_updated": "2026-05-17",
3659
3659
  "discovery_attribution_note": "Vendor-internal discovery by Fortinet PSIRT, disclosed 2024-02-08 via advisory FG-IR-24-015. No external researcher byline. CISA KEV-listed 2024-02-09 with a 7-day federal remediation deadline. Post-exploitation symlink-persistence technique documented in Fortinet's 2025-04-11 advisory after operators reported residual filesystem access on devices patched after compromise."
3660
+ },
3661
+ "CVE-2025-10585": {
3662
+ "id": "CVE-2025-10585",
3663
+ "name": "Google Chrome V8 Type Confusion Zero-Day (TAG-disclosed)",
3664
+ "type": "type-confusion-rce",
3665
+ "cvss_score": 8.8,
3666
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
3667
+ "cisa_kev": true,
3668
+ "cisa_kev_date": "2025-09-23",
3669
+ "cisa_kev_due_date": "2025-10-14",
3670
+ "poc_available": true,
3671
+ "poc_description": "In-the-wild exploit observed by Google TAG prior to disclosure; rendered web content triggers V8 type-confusion in WebAssembly/JIT path leading to renderer RCE. Full chain typically pairs with a Chromium sandbox escape for full system compromise.",
3672
+ "ai_discovered": false,
3673
+ "ai_discovery_source": "vendor_research",
3674
+ "ai_discovery_notes": "Discovered and reported by Google Threat Analysis Group (TAG) — human researcher attribution. Disclosure date 2025-09-16.",
3675
+ "ai_assisted_weaponization": false,
3676
+ "active_exploitation": "confirmed",
3677
+ "affected": "Google Chrome Stable channel < 140.0.7339.185 (Linux), < 140.0.7339.185/186 (Windows/Mac); downstream Chromium browsers (Microsoft Edge, Brave, Opera, Vivaldi) prior to backport.",
3678
+ "affected_versions": [
3679
+ "chrome < 140.0.7339.185"
3680
+ ],
3681
+ "vector": "Malicious web page served to a Chrome user; V8 type-confusion in JIT-compiled code yields arbitrary read/write inside the renderer process.",
3682
+ "patch_available": true,
3683
+ "patch_required_reboot": false,
3684
+ "live_patch_available": false,
3685
+ "framework_control_gaps": {
3686
+ "NIST-800-53-SI-2": "Browser patch cadence in standard configuration baselines does not reflect a 4-hour exploit window for an in-the-wild V8 zero-day with KEV listing.",
3687
+ "ISO-27001-2022-A.8.8": "'Appropriate timescales' undefined for browser zero-days; enterprise patch windows often measured in weeks.",
3688
+ "CIS-Controls-v8-7.4": "Automated browser updates assumed but enterprise managed-update deferral (often 7-30 days for QA) leaves the renderer exposed.",
3689
+ "NIS2-Art21-patch-management": "No explicit guidance on browser zero-day SLA for endpoint estates."
3690
+ },
3691
+ "atlas_refs": [],
3692
+ "attack_refs": [
3693
+ "T1189",
3694
+ "T1203"
3695
+ ],
3696
+ "rwep_factors": {
3697
+ "cisa_kev": 25,
3698
+ "poc_available": 20,
3699
+ "ai_factor": 0,
3700
+ "active_exploitation": 20,
3701
+ "blast_radius": 25,
3702
+ "patch_available": -15,
3703
+ "live_patch_available": 0,
3704
+ "reboot_required": 0
3705
+ },
3706
+ "rwep_score": 75,
3707
+ "verification_sources": [
3708
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-10585",
3709
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
3710
+ "https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html"
3711
+ ],
3712
+ "source_verified": "2026-05-18",
3713
+ "last_updated": "2026-05-18",
3714
+ "vendor_advisories": [
3715
+ {
3716
+ "vendor": "Google",
3717
+ "advisory_id": null,
3718
+ "url": "https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html",
3719
+ "severity": "high",
3720
+ "published_date": "2025-09-17"
3721
+ }
3722
+ ],
3723
+ "discovery_attribution_note": "Discovered and reported by Google Threat Analysis Group (TAG) — human researcher attribution. Disclosure date 2025-09-16. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-10585",
3724
+ "live_patch_tools": []
3725
+ },
3726
+ "CVE-2025-14174": {
3727
+ "id": "CVE-2025-14174",
3728
+ "name": "Apple WebKit Memory Corruption Zero-Day (Targeted Spyware)",
3729
+ "type": "memory-corruption-rce",
3730
+ "cvss_score": 8.8,
3731
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
3732
+ "cisa_kev": true,
3733
+ "cisa_kev_date": "2025-12-15",
3734
+ "cisa_kev_due_date": "2026-01-05",
3735
+ "poc_available": false,
3736
+ "poc_description": "No public PoC; exploit observed in targeted attacks against specific individuals consistent with commercial-spyware / nation-state operator tradecraft. Apple characterized the activity as 'extremely sophisticated'.",
3737
+ "ai_discovered": false,
3738
+ "ai_discovery_source": "human_researcher",
3739
+ "ai_discovery_notes": "Discovery credit not publicly disclosed by Apple at time of patch; targeted-spyware operator activity rather than AI-assisted discovery.",
3740
+ "ai_assisted_weaponization": false,
3741
+ "active_exploitation": "confirmed",
3742
+ "affected": "Apple WebKit on iOS/iPadOS prior to 18.7.3 and 26.2; macOS Tahoe 26.2; Safari 26.2; tvOS/watchOS/visionOS 26.2.",
3743
+ "affected_versions": [
3744
+ "iOS < 18.7.3",
3745
+ "iPadOS < 18.7.3",
3746
+ "iOS < 26.2",
3747
+ "macOS Tahoe < 26.2",
3748
+ "Safari < 26.2"
3749
+ ],
3750
+ "vector": "Maliciously crafted web content rendered by WebKit triggers memory corruption; commonly chained with a kernel exploit for full sandbox escape.",
3751
+ "patch_available": true,
3752
+ "patch_required_reboot": true,
3753
+ "live_patch_available": false,
3754
+ "framework_control_gaps": {
3755
+ "NIST-800-53-SI-2": "Standard mobile patch baselines (often monthly) do not meet the operational reality of targeted-spyware deployment within hours of exploit availability.",
3756
+ "ISO-27001-2022-A.8.8": "Mobile endpoint patching often deferred to user-action; no MDM-enforced 'KEV-class within 24h' control prescribed.",
3757
+ "NIS2-Art21-patch-management": "Mobile estates are usually out of scope of enterprise patch SLA in mid-market deployments."
3758
+ },
3759
+ "atlas_refs": [],
3760
+ "attack_refs": [
3761
+ "T1189",
3762
+ "T1203",
3763
+ "T1212"
3764
+ ],
3765
+ "rwep_factors": {
3766
+ "cisa_kev": 25,
3767
+ "poc_available": 0,
3768
+ "ai_factor": 0,
3769
+ "active_exploitation": 20,
3770
+ "blast_radius": 20,
3771
+ "patch_available": -15,
3772
+ "live_patch_available": 0,
3773
+ "reboot_required": 5
3774
+ },
3775
+ "rwep_score": 55,
3776
+ "verification_sources": [
3777
+ "https://support.apple.com/en-us/HT215000",
3778
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
3779
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-14174"
3780
+ ],
3781
+ "source_verified": "2026-05-18",
3782
+ "last_updated": "2026-05-18",
3783
+ "vendor_advisories": [
3784
+ {
3785
+ "vendor": "Apple",
3786
+ "advisory_id": null,
3787
+ "url": "https://support.apple.com/en-us/HT215000",
3788
+ "severity": "high",
3789
+ "published_date": "2025-12-15"
3790
+ }
3791
+ ],
3792
+ "discovery_attribution_note": "Discovery credit not publicly disclosed by Apple at time of patch; targeted-spyware operator activity rather than AI-assisted discovery. Source: https://support.apple.com/en-us/HT215000",
3793
+ "live_patch_tools": []
3794
+ },
3795
+ "CVE-2025-43529": {
3796
+ "id": "CVE-2025-43529",
3797
+ "name": "Apple WebKit Use-After-Free (DarkSword 1-click chain)",
3798
+ "type": "use-after-free-rce",
3799
+ "cvss_score": 8.8,
3800
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
3801
+ "cisa_kev": true,
3802
+ "cisa_kev_date": "2025-12-15",
3803
+ "cisa_kev_due_date": "2026-01-05",
3804
+ "poc_available": true,
3805
+ "poc_description": "Primary 1-click initial-access vector documented in the 'DarkSword' exploit kit reporting. UAF in WebKit reachable via crafted web content; pairs cleanly with sandbox-escape primitives for full chain.",
3806
+ "ai_discovered": false,
3807
+ "ai_discovery_source": "human_researcher",
3808
+ "ai_discovery_notes": "No AI-tool credit; commercial exploit kit (DarkSword) attribution.",
3809
+ "ai_assisted_weaponization": false,
3810
+ "active_exploitation": "confirmed",
3811
+ "affected": "Apple WebKit on iOS/iPadOS prior to 18.7.3 / 26.2; macOS Tahoe 26.2; Safari 26.2 for macOS; tvOS/watchOS/visionOS 26.2.",
3812
+ "affected_versions": [
3813
+ "iOS < 18.7.3",
3814
+ "iOS < 26.2",
3815
+ "Safari < 26.2"
3816
+ ],
3817
+ "vector": "Crafted web content triggers UAF in WebKit allowing arbitrary code execution within the Web Content sandbox; chained with kernel/sandbox-escape CVEs for full device compromise.",
3818
+ "patch_available": true,
3819
+ "patch_required_reboot": true,
3820
+ "live_patch_available": false,
3821
+ "framework_control_gaps": {
3822
+ "NIST-800-53-SI-2": "Same KEV+PoC class as CVE-2025-14174; default mobile patch SLAs are not calibrated to in-the-wild WebKit UAFs.",
3823
+ "ISO-27001-2022-A.8.8": "Mobile-endpoint patch SLAs treat OS updates as user-pushed rather than enforced within KEV deadlines."
3824
+ },
3825
+ "atlas_refs": [],
3826
+ "attack_refs": [
3827
+ "T1189",
3828
+ "T1203"
3829
+ ],
3830
+ "rwep_factors": {
3831
+ "cisa_kev": 25,
3832
+ "poc_available": 20,
3833
+ "ai_factor": 0,
3834
+ "active_exploitation": 20,
3835
+ "blast_radius": 22,
3836
+ "patch_available": -15,
3837
+ "live_patch_available": 0,
3838
+ "reboot_required": 5
3839
+ },
3840
+ "rwep_score": 77,
3841
+ "verification_sources": [
3842
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-43529",
3843
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
3844
+ "https://support.apple.com/en-us/HT215000"
3845
+ ],
3846
+ "source_verified": "2026-05-18",
3847
+ "last_updated": "2026-05-18",
3848
+ "vendor_advisories": [
3849
+ {
3850
+ "vendor": "Apple",
3851
+ "advisory_id": null,
3852
+ "url": "https://support.apple.com/en-us/HT215000",
3853
+ "severity": "high",
3854
+ "published_date": "2025-12-15"
3855
+ }
3856
+ ],
3857
+ "discovery_attribution_note": "No AI-tool credit; commercial exploit kit (DarkSword) attribution. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-43529",
3858
+ "live_patch_tools": []
3859
+ },
3860
+ "CVE-2025-4919": {
3861
+ "id": "CVE-2025-4919",
3862
+ "name": "Firefox SpiderMonkey Type Confusion (Pwn2Own Berlin)",
3863
+ "type": "type-confusion-rce",
3864
+ "cvss_score": 8.8,
3865
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
3866
+ "cisa_kev": false,
3867
+ "cisa_kev_date": null,
3868
+ "poc_available": true,
3869
+ "poc_description": "Pwn2Own Berlin 2025 contestant exploit; a single-character typo (& vs |) in SpiderMonkey WASM-GC code produced Type Confusion enabling renderer read/write primitives. Sandbox NOT escaped in the disclosed Pwn2Own chain.",
3870
+ "ai_discovered": false,
3871
+ "ai_discovery_source": "human_researcher",
3872
+ "ai_discovery_notes": "Pwn2Own competitor disclosure; same-day patch.",
3873
+ "ai_assisted_weaponization": false,
3874
+ "active_exploitation": "none",
3875
+ "affected": "Mozilla Firefox < 138.0.4, Firefox ESR < 128.10.1 and < 115.23.1, Thunderbird < 138.0.2.",
3876
+ "affected_versions": [
3877
+ "firefox < 138.0.4",
3878
+ "firefox-esr < 128.10.1"
3879
+ ],
3880
+ "vector": "Crafted JavaScript / WebAssembly content compiled through SpiderMonkey JIT triggers Type Confusion, granting attacker primitive read/write inside the renderer.",
3881
+ "patch_available": true,
3882
+ "patch_required_reboot": false,
3883
+ "live_patch_available": false,
3884
+ "framework_control_gaps": {
3885
+ "NIST-800-53-SI-2": "Browser patch SLAs in enterprise baselines (often 7-day for high) lag the same-day vendor turnaround expected for a Pwn2Own-class flaw.",
3886
+ "ISO-27001-2022-A.8.8": "Patch timescale unspecified; secondary-browser (Firefox) maintenance often deprioritized vs Chrome/Edge."
3887
+ },
3888
+ "atlas_refs": [],
3889
+ "attack_refs": [
3890
+ "T1189",
3891
+ "T1203"
3892
+ ],
3893
+ "rwep_factors": {
3894
+ "cisa_kev": 0,
3895
+ "poc_available": 20,
3896
+ "ai_factor": 0,
3897
+ "active_exploitation": 0,
3898
+ "blast_radius": 15,
3899
+ "patch_available": -15,
3900
+ "live_patch_available": 0,
3901
+ "reboot_required": 0
3902
+ },
3903
+ "rwep_score": 20,
3904
+ "verification_sources": [
3905
+ "https://www.mozilla.org/en-US/security/advisories/mfsa2025-36/",
3906
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-4919"
3907
+ ],
3908
+ "source_verified": "2026-05-18",
3909
+ "last_updated": "2026-05-18",
3910
+ "vendor_advisories": [
3911
+ {
3912
+ "vendor": "Mozilla",
3913
+ "advisory_id": "MFSA2025-36",
3914
+ "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-36/",
3915
+ "severity": "critical",
3916
+ "published_date": "2025-05-17"
3917
+ }
3918
+ ],
3919
+ "discovery_attribution_note": "Pwn2Own competitor disclosure; same-day patch. Source: https://www.mozilla.org/en-US/security/advisories/mfsa2025-36/",
3920
+ "live_patch_tools": []
3921
+ },
3922
+ "CVE-2025-24201": {
3923
+ "id": "CVE-2025-24201",
3924
+ "name": "Apple WebKit Out-of-Bounds Write (Glass Cage chain, iOS sandbox escape)",
3925
+ "type": "out-of-bounds-write-sandbox-escape",
3926
+ "cvss_score": 8.8,
3927
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
3928
+ "cisa_kev": true,
3929
+ "cisa_kev_date": "2025-03-12",
3930
+ "cisa_kev_due_date": "2025-04-02",
3931
+ "poc_available": true,
3932
+ "poc_description": "Public 'Glass Cage' zero-click iMessage PNG chain on GitHub combines CVE-2025-43300 (ImageIO) + CVE-2025-24201 (WebKit OOB write) + CVE-2025-24085 (Core Media) for sandbox escape + kernel-level access + device bricking on iOS 18.2.1. Targeted exploitation observed by Apple prior to disclosure.",
3933
+ "ai_discovered": false,
3934
+ "ai_discovery_source": "vendor_research",
3935
+ "ai_discovery_notes": "Apple-internal discovery in response to targeted-attack telemetry on devices running iOS prior to 17.2.",
3936
+ "ai_assisted_weaponization": false,
3937
+ "active_exploitation": "confirmed",
3938
+ "affected": "Apple WebKit on iOS < 18.3.2, iPadOS < 18.3.2, macOS Sequoia < 15.3.2, Safari < 18.3.1, visionOS < 2.3.2.",
3939
+ "affected_versions": [
3940
+ "iOS < 18.3.2",
3941
+ "macOS Sequoia < 15.3.2",
3942
+ "visionOS < 2.3.2"
3943
+ ],
3944
+ "vector": "Crafted web content (zero-click via iMessage when chained with ImageIO bug) escapes the Web Content sandbox via WebKit OOB write.",
3945
+ "patch_available": true,
3946
+ "patch_required_reboot": true,
3947
+ "live_patch_available": false,
3948
+ "framework_control_gaps": {
3949
+ "NIST-800-53-SI-2": "KEV-listed with public chain; standard mobile patch SLAs (often 14-30 days) do not match the 4-hour exposure window for zero-click chains.",
3950
+ "ISO-27001-2022-A.8.8": "Mobile-OS-update timeliness is user-driven; no enforced KEV-class SLA.",
3951
+ "ENISA-mobile-secure-baseline": "Operator MDM policy is the only enforcement layer; default Apple MDM profiles do not enforce KEV-deadline updates."
3952
+ },
3953
+ "atlas_refs": [],
3954
+ "attack_refs": [
3955
+ "T1189",
3956
+ "T1203",
3957
+ "T1068"
3958
+ ],
3959
+ "rwep_factors": {
3960
+ "cisa_kev": 25,
3961
+ "poc_available": 20,
3962
+ "ai_factor": 0,
3963
+ "active_exploitation": 20,
3964
+ "blast_radius": 25,
3965
+ "patch_available": -15,
3966
+ "live_patch_available": 0,
3967
+ "reboot_required": 5
3968
+ },
3969
+ "rwep_score": 80,
3970
+ "verification_sources": [
3971
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-24201",
3972
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
3973
+ "https://support.apple.com/en-us/122281",
3974
+ "https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201"
3975
+ ],
3976
+ "source_verified": "2026-05-18",
3977
+ "last_updated": "2026-05-18",
3978
+ "vendor_advisories": [
3979
+ {
3980
+ "vendor": "Apple",
3981
+ "advisory_id": null,
3982
+ "url": "https://support.apple.com/en-us/122281",
3983
+ "severity": "high",
3984
+ "published_date": "2025-03-11"
3985
+ }
3986
+ ],
3987
+ "discovery_attribution_note": "Apple-internal discovery in response to targeted-attack telemetry on devices running iOS prior to 17.2. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-24201",
3988
+ "live_patch_tools": []
3989
+ },
3990
+ "CVE-2025-43300": {
3991
+ "id": "CVE-2025-43300",
3992
+ "name": "Apple ImageIO Out-of-Bounds Write (DNG/JPEG-lossless, zero-click chain root)",
3993
+ "type": "out-of-bounds-write-rce",
3994
+ "cvss_score": 8.8,
3995
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
3996
+ "cisa_kev": true,
3997
+ "cisa_kev_date": "2025-08-21",
3998
+ "cisa_kev_due_date": "2025-09-11",
3999
+ "poc_available": true,
4000
+ "poc_description": "Public 'Glass Cage' chain on GitHub uses CVE-2025-43300 as the initial-access primitive (TIFF SamplesPerPixel vs JPEG SOF3 metadata mismatch). Apple confirmed in-the-wild exploitation as part of an 'extremely sophisticated attack' against targeted individuals.",
4001
+ "ai_discovered": false,
4002
+ "ai_discovery_source": "vendor_research",
4003
+ "ai_discovery_notes": "Apple-internal disclosure; full attribution undisclosed.",
4004
+ "ai_assisted_weaponization": false,
4005
+ "active_exploitation": "confirmed",
4006
+ "affected": "Apple ImageIO on iOS < 18.6.2, iPadOS < 18.6.2, macOS Sequoia < 15.6.1, macOS Sonoma < 14.7.8, macOS Ventura < 13.7.8.",
4007
+ "affected_versions": [
4008
+ "iOS < 18.6.2",
4009
+ "macOS Sequoia < 15.6.1",
4010
+ "macOS Sonoma < 14.7.8",
4011
+ "macOS Ventura < 13.7.8"
4012
+ ],
4013
+ "vector": "Crafted DNG / JPEG-lossless image triggers OOB write in ImageIO when TIFF SamplesPerPixel conflicts with JPEG SOF3 component count; zero-click via iMessage / WhatsApp / any auto-rendering image path.",
4014
+ "patch_available": true,
4015
+ "patch_required_reboot": true,
4016
+ "live_patch_available": false,
4017
+ "framework_control_gaps": {
4018
+ "NIST-800-53-SI-2": "Zero-click image-processing CVE; default mobile patch SLAs assume user-driven update timing.",
4019
+ "ISO-27001-2022-A.8.8": "Mobile endpoints often outside enterprise patch-management scope.",
4020
+ "PCI-DSS-4.0-6.3.3": "1-month critical SLA insufficient for an in-the-wild zero-click chain.",
4021
+ "NIS2-Art21-patch-management": "Mobile endpoint patching not explicitly enumerated."
4022
+ },
4023
+ "atlas_refs": [],
4024
+ "attack_refs": [
4025
+ "T1203",
4026
+ "T1068"
4027
+ ],
4028
+ "rwep_factors": {
4029
+ "cisa_kev": 25,
4030
+ "poc_available": 20,
4031
+ "ai_factor": 0,
4032
+ "active_exploitation": 20,
4033
+ "blast_radius": 25,
4034
+ "patch_available": -15,
4035
+ "live_patch_available": 0,
4036
+ "reboot_required": 5
4037
+ },
4038
+ "rwep_score": 80,
4039
+ "verification_sources": [
4040
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-43300",
4041
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
4042
+ "https://support.apple.com/en-us/124925"
4043
+ ],
4044
+ "source_verified": "2026-05-18",
4045
+ "last_updated": "2026-05-18",
4046
+ "vendor_advisories": [
4047
+ {
4048
+ "vendor": "Apple",
4049
+ "advisory_id": null,
4050
+ "url": "https://support.apple.com/en-us/124925",
4051
+ "severity": "high",
4052
+ "published_date": "2025-08-20"
4053
+ }
4054
+ ],
4055
+ "discovery_attribution_note": "Apple-internal disclosure; full attribution undisclosed. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-43300",
4056
+ "live_patch_tools": []
4057
+ },
4058
+ "CVE-2025-38352": {
4059
+ "id": "CVE-2025-38352",
4060
+ "name": "Android / Linux Kernel POSIX CPU Timer Race (sandbox-escape LPE)",
4061
+ "type": "race-condition-lpe",
4062
+ "cvss_score": 7.4,
4063
+ "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
4064
+ "cisa_kev": true,
4065
+ "cisa_kev_date": "2025-09-04",
4066
+ "cisa_kev_due_date": "2025-09-25",
4067
+ "poc_available": true,
4068
+ "poc_description": "Public 'chronomaly' PoC on GitHub (farazsth98/chronomaly) targets vulnerable x86_64 Linux kernels v5.10.x. Race between handle_posix_cpu_timers() and posix_cpu_timer_del() triggered when a task exits while CPU timers are being removed; improper exit_state handling opens an LPE window. Confirmed used as a zero-day to escape Android application sandbox.",
4069
+ "ai_discovered": false,
4070
+ "ai_discovery_source": "vendor_research",
4071
+ "ai_discovery_notes": "Google Android Security Bulletin September 2025 attribution; no AI-tool credit.",
4072
+ "ai_assisted_weaponization": false,
4073
+ "active_exploitation": "confirmed",
4074
+ "affected": "Linux kernel including downstream Android kernels prior to the September 2025 patch level. Affects Android devices on patch levels < 2025-09-01.",
4075
+ "affected_versions": [
4076
+ "linux-kernel < 5.10.236",
4077
+ "android-security-patch-level < 2025-09-01"
4078
+ ],
4079
+ "vector": "Local unprivileged process on Android (or Linux) exercises POSIX CPU timer race during task teardown to gain elevated privileges; chained with WebKit/Chrome renderer compromise for sandbox escape.",
4080
+ "patch_available": true,
4081
+ "patch_required_reboot": true,
4082
+ "live_patch_available": true,
4083
+ "live_patch_tools": [
4084
+ "kpatch",
4085
+ "canonical-livepatch"
4086
+ ],
4087
+ "framework_control_gaps": {
4088
+ "NIST-800-53-SI-2": "Android device patch deployment cadence varies wildly by OEM (often 30-90 days behind Google bulletin) — KEV deadline cannot realistically bind non-Pixel devices.",
4089
+ "ISO-27001-2022-A.8.8": "Mobile firmware patching timescales undefined; OEM-controlled.",
4090
+ "NIS2-Art21-patch-management": "Mobile-OS estate patch SLA is exception territory in most NIS2 OES filings."
4091
+ },
4092
+ "atlas_refs": [],
4093
+ "attack_refs": [
4094
+ "T1068",
4095
+ "T1611"
4096
+ ],
4097
+ "rwep_factors": {
4098
+ "cisa_kev": 25,
4099
+ "poc_available": 20,
4100
+ "ai_factor": 0,
4101
+ "active_exploitation": 20,
4102
+ "blast_radius": 28,
4103
+ "patch_available": -15,
4104
+ "live_patch_available": -10,
4105
+ "reboot_required": 5
4106
+ },
4107
+ "rwep_score": 73,
4108
+ "verification_sources": [
4109
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-38352",
4110
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
4111
+ "https://source.android.com/docs/security/bulletin/2025-09-01",
4112
+ "https://github.com/farazsth98/chronomaly"
4113
+ ],
4114
+ "source_verified": "2026-05-18",
4115
+ "last_updated": "2026-05-18",
4116
+ "vendor_advisories": [
4117
+ {
4118
+ "vendor": "Google (Android)",
4119
+ "advisory_id": "A-2025-09-01",
4120
+ "url": "https://source.android.com/docs/security/bulletin/2025-09-01",
4121
+ "severity": "high",
4122
+ "published_date": "2025-09-02"
4123
+ }
4124
+ ],
4125
+ "discovery_attribution_note": "Google Android Security Bulletin September 2025 attribution; no AI-tool credit. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-38352"
4126
+ },
4127
+ "CVE-2025-55241": {
4128
+ "id": "CVE-2025-55241",
4129
+ "name": "Microsoft Entra ID Cross-Tenant Actor Token Impersonation",
4130
+ "type": "cross-tenant-privilege-escalation",
4131
+ "cvss_score": 10,
4132
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
4133
+ "cisa_kev": false,
4134
+ "cisa_kev_date": null,
4135
+ "kev_scope_note": "Not added to KEV — Microsoft fixed pre-disclosure (server-side) and no in-the-wild exploitation was observed prior to remediation. KEV scope ordinarily excludes cloud-control-plane bugs that were closed before any operator could act.",
4136
+ "poc_available": false,
4137
+ "poc_description": "Researcher (Dirk-Jan Mollema) demonstrated end-to-end Global Admin impersonation across arbitrary tenants. Microsoft patched server-side before public disclosure; no operator-side PoC exists post-fix because the attack surface has been removed.",
4138
+ "ai_discovered": false,
4139
+ "ai_discovery_source": "human_researcher",
4140
+ "ai_discovery_notes": "Researcher disclosure 2025-07-14; Microsoft global server-side fix 2025-07-17; additional hardening 2025-08-06; public disclosure September 2025.",
4141
+ "ai_assisted_weaponization": false,
4142
+ "active_exploitation": "none",
4143
+ "affected": "Microsoft Entra ID (formerly Azure Active Directory) tenants with the legacy Azure AD Graph API enabled. Pre-2025-07-17 service state.",
4144
+ "affected_versions": [
4145
+ "Entra ID cloud service pre-2025-07-17"
4146
+ ],
4147
+ "vector": "Attacker requests an undocumented 'Actor' token from a benign tenant; presents it to the legacy Azure AD Graph endpoint in a target tenant; the API fails to validate originating-tenant claim and authorizes the impersonated identity, bypassing MFA, Conditional Access, and API-level logging.",
4148
+ "patch_available": true,
4149
+ "patch_required_reboot": false,
4150
+ "live_patch_available": false,
4151
+ "framework_control_gaps": {
4152
+ "NIST-800-53-AC-6": "Cross-tenant authority validation is not an enumerated control; least-privilege assumed within tenant boundary.",
4153
+ "NIST-800-53-IA-8": "Identity-provider-side flaw escapes federation trust boundary assumptions.",
4154
+ "ISO-27001-2022-A.5.15": "Access control bound to tenant identity; cross-tenant trust validation undefined.",
4155
+ "EU-AI-Act-Art15": "Cloud-identity primitives underpinning agentic systems are not in scope; supply-chain identity validation gap."
4156
+ },
4157
+ "atlas_refs": [],
4158
+ "attack_refs": [
4159
+ "T1078.004",
4160
+ "T1098"
4161
+ ],
4162
+ "rwep_factors": {
4163
+ "cisa_kev": 0,
4164
+ "poc_available": 0,
4165
+ "ai_factor": 0,
4166
+ "active_exploitation": 0,
4167
+ "blast_radius": 30,
4168
+ "patch_available": -15,
4169
+ "live_patch_available": 0,
4170
+ "reboot_required": 0
4171
+ },
4172
+ "rwep_score": 15,
4173
+ "verification_sources": [
4174
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55241",
4175
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-55241",
4176
+ "https://dirkjanm.io/",
4177
+ "https://practical365.com/death-by-token-understanding-cve-2025-55241/"
4178
+ ],
4179
+ "source_verified": "2026-05-18",
4180
+ "last_updated": "2026-05-18",
4181
+ "vendor_advisories": [
4182
+ {
4183
+ "vendor": "Microsoft",
4184
+ "advisory_id": "CVE-2025-55241",
4185
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55241",
4186
+ "severity": "critical",
4187
+ "published_date": "2025-09-17"
4188
+ }
4189
+ ],
4190
+ "discovery_attribution_note": "Researcher disclosure 2025-07-14; Microsoft global server-side fix 2025-07-17; additional hardening 2025-08-06; public disclosure September 2025. Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55241",
4191
+ "live_patch_tools": []
4192
+ },
4193
+ "CVE-2025-21085": {
4194
+ "id": "CVE-2025-21085",
4195
+ "name": "Cisco Duo Authentication Proxy Credential Disclosure in Logs",
4196
+ "type": "information-disclosure-credential",
4197
+ "cvss_score": 5,
4198
+ "cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
4199
+ "cisa_kev": false,
4200
+ "cisa_kev_date": null,
4201
+ "poc_available": true,
4202
+ "poc_description": "No standalone exploit; abuse requires log-file read on the Duo Auth Proxy host. Real-world abuse depends on prior host access plus debug-level logging being enabled (Cisco PSIRT advisory and ldaptor CVE-2025-20345 dependency advisory).",
4203
+ "ai_discovered": false,
4204
+ "ai_discovery_source": "vendor_research",
4205
+ "ai_discovery_notes": "Vendor-internal discovery via Cisco PSIRT.",
4206
+ "ai_assisted_weaponization": false,
4207
+ "active_exploitation": "none",
4208
+ "affected": "Cisco Duo Authentication Proxy versions prior to 6.5.3 with debug-level logging enabled and LDAP/AD password-change operations in scope.",
4209
+ "affected_versions": [
4210
+ "duo-authproxy < 6.5.3"
4211
+ ],
4212
+ "vector": "Local authenticated attacker (or post-compromise lateral mover) reads authproxy.log to recover cleartext credentials emitted during LDAP/AD password-change operations.",
4213
+ "patch_available": true,
4214
+ "patch_required_reboot": false,
4215
+ "live_patch_available": false,
4216
+ "framework_control_gaps": {
4217
+ "NIST-800-53-AU-9": "Log-content classification is operator-defined; sensitive-data-in-logs is a recurring pattern across identity middleware.",
4218
+ "ISO-27001-2022-A.8.15": "Logging integrity vs sensitive-content separation underspecified.",
4219
+ "PCI-DSS-4.0-10.5": "Logs containing authentication secrets violate scope-isolation assumptions."
4220
+ },
4221
+ "atlas_refs": [],
4222
+ "attack_refs": [
4223
+ "T1552.001",
4224
+ "T1078"
4225
+ ],
4226
+ "rwep_factors": {
4227
+ "cisa_kev": 0,
4228
+ "poc_available": 20,
4229
+ "ai_factor": 0,
4230
+ "active_exploitation": 0,
4231
+ "blast_radius": 15,
4232
+ "patch_available": -15,
4233
+ "live_patch_available": 0,
4234
+ "reboot_required": 0
4235
+ },
4236
+ "rwep_score": 20,
4237
+ "verification_sources": [
4238
+ "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-auth-info-JgkSWBLz",
4239
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-21085"
4240
+ ],
4241
+ "source_verified": "2026-05-18",
4242
+ "last_updated": "2026-05-18",
4243
+ "vendor_advisories": [
4244
+ {
4245
+ "vendor": "Cisco",
4246
+ "advisory_id": "cisco-sa-duo-auth-info-JgkSWBLz",
4247
+ "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-auth-info-JgkSWBLz",
4248
+ "severity": "medium",
4249
+ "published_date": "2025-09-04"
4250
+ }
4251
+ ],
4252
+ "discovery_attribution_note": "Vendor-internal discovery via Cisco PSIRT. Source: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-auth-info-JgkSWBLz",
4253
+ "live_patch_tools": []
4254
+ },
4255
+ "CVE-2025-1094": {
4256
+ "id": "CVE-2025-1094",
4257
+ "name": "PostgreSQL psql SQL Injection via Invalid UTF-8 → ACE",
4258
+ "type": "sql-injection-rce",
4259
+ "cvss_score": 8.1,
4260
+ "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
4261
+ "cisa_kev": true,
4262
+ "cisa_kev_date": "2025-02-13",
4263
+ "cisa_kev_due_date": "2025-03-06",
4264
+ "poc_available": true,
4265
+ "poc_description": "Public Rapid7 advisory + Metasploit module + ishwardeepp PoC on GitHub. Invalid-UTF-8 byte sequences interact with PostgreSQL string-escaping routines and psql meta-command processing to permit injection and arbitrary command execution. Exploited in BeyondTrust + US Treasury breaches.",
4266
+ "ai_discovered": false,
4267
+ "ai_discovery_source": "vendor_research",
4268
+ "ai_discovery_notes": "Rapid7 disclosure during BeyondTrust incident triage; no AI-tool attribution.",
4269
+ "ai_assisted_weaponization": false,
4270
+ "active_exploitation": "confirmed",
4271
+ "affected": "PostgreSQL psql interactive tool < 17.3, < 16.7, < 15.11, < 14.16, < 13.19; libpq escaping path.",
4272
+ "affected_versions": [
4273
+ "postgresql < 17.3",
4274
+ "postgresql < 16.7",
4275
+ "postgresql < 15.11",
4276
+ "postgresql < 14.16",
4277
+ "postgresql < 13.19"
4278
+ ],
4279
+ "vector": "Attacker injects invalid UTF-8 byte sequences into input bound for psql; libpq escape-routine mishandling enables SQL injection, escalated to arbitrary command execution via psql meta-commands.",
4280
+ "patch_available": true,
4281
+ "patch_required_reboot": false,
4282
+ "live_patch_available": false,
4283
+ "framework_control_gaps": {
4284
+ "NIST-800-53-SI-10": "Input-validation control assumes UTF-8 well-formedness; invalid-byte handling is implementation-defined.",
4285
+ "PCI-DSS-4.0-6.2.4": "Critical-class injection patch SLA (30 days) insufficient for KEV+ACE+public-PoC.",
4286
+ "ISO-27001-2022-A.8.28": "Secure coding for input validation; UTF-8 invalidity not enumerated.",
4287
+ "NIS2-Art21-patch-management": "30-day patch window inconsistent with KEV deadline."
4288
+ },
4289
+ "atlas_refs": [],
4290
+ "attack_refs": [
4291
+ "T1190",
4292
+ "T1059"
4293
+ ],
4294
+ "rwep_factors": {
4295
+ "cisa_kev": 25,
4296
+ "poc_available": 20,
4297
+ "ai_factor": 0,
4298
+ "active_exploitation": 20,
4299
+ "blast_radius": 27,
4300
+ "patch_available": -15,
4301
+ "live_patch_available": 0,
4302
+ "reboot_required": 0
4303
+ },
4304
+ "rwep_score": 77,
4305
+ "verification_sources": [
4306
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-1094",
4307
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
4308
+ "https://www.rapid7.com/blog/post/2025/02/13/cve-2025-1094-postgresql-psql-sql-injection-fixed/",
4309
+ "https://www.postgresql.org/support/security/"
4310
+ ],
4311
+ "source_verified": "2026-05-18",
4312
+ "last_updated": "2026-05-18",
4313
+ "vendor_advisories": [
4314
+ {
4315
+ "vendor": "PostgreSQL Global Development Group",
4316
+ "advisory_id": null,
4317
+ "url": "https://www.postgresql.org/support/security/CVE-2025-1094/",
4318
+ "severity": "high",
4319
+ "published_date": "2025-02-13"
4320
+ }
4321
+ ],
4322
+ "discovery_attribution_note": "Rapid7 disclosure during BeyondTrust incident triage; no AI-tool attribution. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-1094",
4323
+ "live_patch_tools": []
4324
+ },
4325
+ "CVE-2025-49844": {
4326
+ "id": "CVE-2025-49844",
4327
+ "name": "Redis Lua Use-After-Free RCE ('RediShell')",
4328
+ "type": "use-after-free-rce",
4329
+ "cvss_score": 10,
4330
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
4331
+ "cisa_kev": false,
4332
+ "cisa_kev_date": null,
4333
+ "poc_available": true,
4334
+ "poc_description": "Wiz Research disclosure with full technical details. 13-year-old UAF in Redis Lua interpreter; post-auth attacker sends crafted Lua script to escape sandbox and achieve native code execution. Default Redis deployments without auth enable unauthenticated exploitation.",
4335
+ "ai_discovered": false,
4336
+ "ai_discovery_source": "vendor_research",
4337
+ "ai_discovery_notes": "Wiz Research disclosure (human-led); no AI-tool credit.",
4338
+ "ai_assisted_weaponization": false,
4339
+ "active_exploitation": "suspected",
4340
+ "affected": "Redis — all versions due to root-cause in shared Lua interpreter. Fix shipped in Redis 7.4.6 / 7.2.11 and downstream KeyDB / Valkey forks.",
4341
+ "affected_versions": [
4342
+ "redis <= 7.4.5",
4343
+ "redis <= 7.2.10",
4344
+ "valkey <= 7.2.x pre-fix"
4345
+ ],
4346
+ "vector": "Network-reachable Redis instance accepts a crafted Lua EVAL script that exploits a UAF in the Lua sandbox; sandbox-escape yields native code execution as the redis-server process.",
4347
+ "patch_available": true,
4348
+ "patch_required_reboot": false,
4349
+ "live_patch_available": false,
4350
+ "framework_control_gaps": {
4351
+ "NIST-800-53-CM-7": "Default-deny on Lua scripting not enumerated; Redis ships with EVAL enabled.",
4352
+ "ISO-27001-2022-A.8.9": "Configuration baselines for in-memory stores rarely disable Lua scripting.",
4353
+ "PCI-DSS-4.0-6.3.3": "30-day SLA insufficient for CVSS:10.0 + 13-year backdoor-class regression.",
4354
+ "OWASP-API-Security-Top-10-API8:2023": "Server-side script execution as data primitive is endemic to Redis."
4355
+ },
4356
+ "atlas_refs": [],
4357
+ "attack_refs": [
4358
+ "T1190",
4359
+ "T1059.006"
4360
+ ],
4361
+ "rwep_factors": {
4362
+ "cisa_kev": 0,
4363
+ "poc_available": 20,
4364
+ "ai_factor": 0,
4365
+ "active_exploitation": 10,
4366
+ "blast_radius": 28,
4367
+ "patch_available": -15,
4368
+ "live_patch_available": 0,
4369
+ "reboot_required": 0
4370
+ },
4371
+ "rwep_score": 43,
4372
+ "verification_sources": [
4373
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-49844",
4374
+ "https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844",
4375
+ "https://github.com/redis/redis/security/advisories"
4376
+ ],
4377
+ "source_verified": "2026-05-18",
4378
+ "last_updated": "2026-05-18",
4379
+ "vendor_advisories": [
4380
+ {
4381
+ "vendor": "Redis",
4382
+ "advisory_id": null,
4383
+ "url": "https://github.com/redis/redis/security/advisories",
4384
+ "severity": "critical",
4385
+ "published_date": "2025-10-06"
4386
+ }
4387
+ ],
4388
+ "discovery_attribution_note": "Wiz Research disclosure (human-led); no AI-tool credit. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-49844",
4389
+ "live_patch_tools": []
4390
+ },
4391
+ "CVE-2025-14847": {
4392
+ "id": "CVE-2025-14847",
4393
+ "name": "MongoDB Server zlib Heap-Memory Disclosure ('MongoBleed')",
4394
+ "type": "information-disclosure-heap",
4395
+ "cvss_score": 7.5,
4396
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
4397
+ "cisa_kev": false,
4398
+ "cisa_kev_date": null,
4399
+ "poc_available": true,
4400
+ "poc_description": "Public exploit code observed; active opportunistic scanning of internet-exposed MongoDB instances reported. Mismatched length fields in zlib-compressed wire-protocol headers cause MongoDB Server to return uninitialized heap memory to unauthenticated clients.",
4401
+ "ai_discovered": false,
4402
+ "ai_discovery_source": "vendor_research",
4403
+ "ai_discovery_notes": "Bitsight + MongoDB-coordinated disclosure; no AI-tool attribution.",
4404
+ "ai_assisted_weaponization": false,
4405
+ "active_exploitation": "confirmed",
4406
+ "affected": "MongoDB Server affected branches per vendor advisory; Bitsight enumerated multiple vulnerable releases across the 5.x / 6.x / 7.x / 8.x series.",
4407
+ "affected_versions": [
4408
+ "mongodb-server pre-2025-fix"
4409
+ ],
4410
+ "vector": "Unauthenticated remote attacker sends crafted compressed wire-protocol message with mismatched length fields; server replies with uninitialized heap memory (potentially containing prior request data, keys, document fragments).",
4411
+ "patch_available": true,
4412
+ "patch_required_reboot": false,
4413
+ "live_patch_available": false,
4414
+ "framework_control_gaps": {
4415
+ "NIST-800-53-SC-28": "Encryption-at-rest controls don't address in-memory leak.",
4416
+ "ISO-27001-2022-A.8.24": "Cryptographic protection in transit assumed; heap-disclosure escapes both.",
4417
+ "PCI-DSS-4.0-3.5": "Cardholder data potentially exposed via uninitialized-memory leak even when at-rest encryption is correct.",
4418
+ "GDPR-Art32": "Confidentiality-by-design control insufficient for memory-disclosure class."
4419
+ },
4420
+ "atlas_refs": [],
4421
+ "attack_refs": [
4422
+ "T1190",
4423
+ "T1005"
4424
+ ],
4425
+ "rwep_factors": {
4426
+ "cisa_kev": 0,
4427
+ "poc_available": 20,
4428
+ "ai_factor": 0,
4429
+ "active_exploitation": 20,
4430
+ "blast_radius": 22,
4431
+ "patch_available": -15,
4432
+ "live_patch_available": 0,
4433
+ "reboot_required": 0
4434
+ },
4435
+ "rwep_score": 47,
4436
+ "verification_sources": [
4437
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-14847",
4438
+ "https://www.mongodb.com/alerts",
4439
+ "https://www.bitsight.com/blog/critical-vulnerability-alert-cve-2025-14847-mongodb-mongobleed"
4440
+ ],
4441
+ "source_verified": "2026-05-18",
4442
+ "last_updated": "2026-05-18",
4443
+ "vendor_advisories": [
4444
+ {
4445
+ "vendor": "MongoDB",
4446
+ "advisory_id": null,
4447
+ "url": "https://www.mongodb.com/alerts",
4448
+ "severity": "high",
4449
+ "published_date": "2025-11-19"
4450
+ }
4451
+ ],
4452
+ "discovery_attribution_note": "Bitsight + MongoDB-coordinated disclosure; no AI-tool attribution. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-14847",
4453
+ "live_patch_tools": []
4454
+ },
4455
+ "CVE-2025-8671": {
4456
+ "id": "CVE-2025-8671",
4457
+ "name": "HTTP/2 'MadeYouReset' DoS (Rapid Reset successor)",
4458
+ "type": "denial-of-service-protocol",
4459
+ "cvss_score": 7.5,
4460
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
4461
+ "cisa_kev": false,
4462
+ "cisa_kev_date": null,
4463
+ "poc_available": true,
4464
+ "poc_description": "Public PoC tooling (moften/CVE-2025-8671-MadeYouReset-HTTP-2-DDoS). Attacker uses malformed WINDOW_UPDATE, PRIORITY, or DATA frames to trigger server-side stream resets while backend continues processing, bypassing MAX_CONCURRENT_STREAMS and exhausting resources. Disclosed 2025-08-13 by Tel Aviv University + Imperva researchers.",
4465
+ "ai_discovered": false,
4466
+ "ai_discovery_source": "academic_ai_fuzzing",
4467
+ "ai_discovery_notes": "Tel Aviv University academic disclosure paired with Imperva production traffic analysis. ai_discovery_source set to academic_ai_fuzzing as the closest enum match for protocol-fuzzing research, though specific AI-fuzzing tool credit was not published.",
4468
+ "ai_assisted_weaponization": false,
4469
+ "active_exploitation": "none",
4470
+ "affected": "HTTP/2 implementations including Apache Tomcat, Netty (CVE-2025-55163), Varnish, Fastly, F5, SUSE-shipped libraries, Wind River. Estimated 2.8M+ internet-facing instances vulnerable.",
4471
+ "affected_versions": [
4472
+ "netty < 4.1.124.Final",
4473
+ "tomcat-pre-fix",
4474
+ "varnish-pre-fix",
4475
+ "h2-implementations-pre-2025-08-13"
4476
+ ],
4477
+ "vector": "Remote unauthenticated attacker sends malformed HTTP/2 control frames over a single connection that cause the server to emit stream resets while keeping backend work in flight, bypassing concurrency limits.",
4478
+ "patch_available": true,
4479
+ "patch_required_reboot": false,
4480
+ "live_patch_available": false,
4481
+ "framework_control_gaps": {
4482
+ "NIST-800-53-SC-5": "DoS-protection controls do not enumerate HTTP/2 stream-reset bypass class.",
4483
+ "ISO-27001-2022-A.8.9": "Configuration baselines don't address HTTP/2 protocol implementation differences.",
4484
+ "OWASP-API-Security-Top-10-API4:2023": "Rate-limiting at HTTP layer ineffective against per-connection HTTP/2 stream amplification.",
4485
+ "NIS2-Art21-availability": "Availability-class threat under-specified for protocol-implementation bugs."
4486
+ },
4487
+ "atlas_refs": [],
4488
+ "attack_refs": [
4489
+ "T1498",
4490
+ "T1499.001"
4491
+ ],
4492
+ "rwep_factors": {
4493
+ "cisa_kev": 0,
4494
+ "poc_available": 20,
4495
+ "ai_factor": 0,
4496
+ "active_exploitation": 0,
4497
+ "blast_radius": 25,
4498
+ "patch_available": -15,
4499
+ "live_patch_available": 0,
4500
+ "reboot_required": 0
4501
+ },
4502
+ "rwep_score": 30,
4503
+ "verification_sources": [
4504
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-8671",
4505
+ "https://blog.cloudflare.com/madeyoureset-an-http-2-vulnerability-thwarted-by-rapid-reset-mitigations/",
4506
+ "https://github.com/advisories/GHSA-prj3-ccx8-p6x4",
4507
+ "https://thehackernews.com/2025/08/new-http2-madeyoureset-vulnerability.html"
4508
+ ],
4509
+ "source_verified": "2026-05-18",
4510
+ "last_updated": "2026-05-18",
4511
+ "vendor_advisories": [
4512
+ {
4513
+ "vendor": "Netty",
4514
+ "advisory_id": "GHSA-prj3-ccx8-p6x4",
4515
+ "url": "https://github.com/advisories/GHSA-prj3-ccx8-p6x4",
4516
+ "severity": "high",
4517
+ "published_date": "2025-08-13"
4518
+ }
4519
+ ],
4520
+ "discovery_attribution_note": "Tel Aviv University academic disclosure paired with Imperva production traffic analysis. ai_discovery_source set to academic_ai_fuzzing as the closest enum match for protocol-fuzzing research, though specific AI-fuzzing tool credit was not published. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-8671",
4521
+ "live_patch_tools": []
4522
+ },
4523
+ "CVE-2025-6965": {
4524
+ "id": "CVE-2025-6965",
4525
+ "name": "SQLite Memory Corruption (Big Sleep AI pre-emptive discovery)",
4526
+ "type": "memory-corruption-rce",
4527
+ "cvss_score": 7.2,
4528
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
4529
+ "cisa_kev": false,
4530
+ "cisa_kev_date": null,
4531
+ "poc_available": false,
4532
+ "poc_description": "Pre-emptive disclosure — Google's Big Sleep AI agent identified the bug from threat-intelligence signals before any in-the-wild exploit landed. Google publicly stated this was 'the first time an AI agent has been used to directly foil efforts to exploit a vulnerability in the wild'.",
4533
+ "ai_discovered": true,
4534
+ "ai_discovery_source": "vendor_research",
4535
+ "ai_discovery_date": "2025-07-15",
4536
+ "ai_discovery_notes": "Google DeepMind + Project Zero 'Big Sleep' AI agent. First documented AI-agent zero-day prevention. Integer overflow → array out-of-bounds read in SQLite < 3.50.2.",
4537
+ "ai_assisted_weaponization": false,
4538
+ "active_exploitation": "suspected",
4539
+ "affected": "SQLite versions prior to 3.50.2 — extremely broad downstream footprint (embedded systems, mobile OS, browsers, AI/ML pipelines, every Python/Node/Go runtime that uses SQLite).",
4540
+ "affected_versions": [
4541
+ "sqlite < 3.50.2"
4542
+ ],
4543
+ "vector": "Attacker who can inject arbitrary SQL statements into an application causes integer overflow yielding out-of-bounds array read; memory disclosure / corruption depending on context.",
4544
+ "patch_available": true,
4545
+ "patch_required_reboot": false,
4546
+ "live_patch_available": false,
4547
+ "framework_control_gaps": {
4548
+ "NIST-800-53-SI-10": "Application-layer SQL filtering assumed; embedded-SQLite attack surface often invisible to AppSec scope.",
4549
+ "ISO-27001-2022-A.8.28": "Secure-coding controls don't cover bundled-library memory-safety regressions.",
4550
+ "EU-AI-Act-Art15": "AI-system robustness — discovered by AI, prevented by AI; framework has no concept of AI-defender attribution credit."
4551
+ },
4552
+ "atlas_refs": [
4553
+ "AML.T0024"
4554
+ ],
4555
+ "attack_refs": [
4556
+ "T1190"
4557
+ ],
4558
+ "rwep_factors": {
4559
+ "cisa_kev": 0,
4560
+ "poc_available": 0,
4561
+ "ai_factor": 15,
4562
+ "active_exploitation": 10,
4563
+ "blast_radius": 28,
4564
+ "patch_available": -15,
4565
+ "live_patch_available": 0,
4566
+ "reboot_required": 0
4567
+ },
4568
+ "rwep_score": 38,
4569
+ "verification_sources": [
4570
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
4571
+ "https://thehackernews.com/2025/07/google-ai-big-sleep-stops-exploitation.html",
4572
+ "https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap",
4573
+ "https://www.sqlite.org/releaselog/3_50_2.html"
4574
+ ],
4575
+ "source_verified": "2026-05-18",
4576
+ "last_updated": "2026-05-18",
4577
+ "vendor_advisories": [
4578
+ {
4579
+ "vendor": "SQLite",
4580
+ "advisory_id": null,
4581
+ "url": "https://www.sqlite.org/releaselog/3_50_2.html",
4582
+ "severity": "high",
4583
+ "published_date": "2025-06-28"
4584
+ }
4585
+ ],
4586
+ "discovery_attribution_note": "AI-surfaced by Google's 'Big Sleep' (DeepMind + Project Zero collaboration, Gemini-backed). Notable as the first AI-agent foil of an in-the-wild zero-day exploitation campaign. Hard Rule #7 anchor entry.",
4587
+ "live_patch_tools": []
4588
+ },
4589
+ "CVE-2026-22778": {
4590
+ "id": "CVE-2026-22778",
4591
+ "name": "vLLM Multimodal Heap Overflow RCE via JPEG2000 / FFmpeg / OpenCV",
4592
+ "type": "heap-overflow-rce",
4593
+ "cvss_score": 9.8,
4594
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
4595
+ "cisa_kev": false,
4596
+ "cisa_kev_date": null,
4597
+ "poc_available": true,
4598
+ "poc_description": "OX Security disclosure with full chain: malicious video URL submitted to vLLM API → OpenCV decodes via bundled FFmpeg 5.1.x → heap overflow in JPEG2000 decoder. Heap address leak primitive sourced from PIL error message in earlier vulnerable vLLM versions facilitates exploitation.",
4599
+ "ai_discovered": false,
4600
+ "ai_discovery_source": "vendor_research",
4601
+ "ai_discovery_notes": "OX Security human research disclosure.",
4602
+ "ai_assisted_weaponization": false,
4603
+ "active_exploitation": "suspected",
4604
+ "affected": "vLLM multimodal endpoints prior to 0.14.1; affects FFmpeg 5.1.x bundled inside OpenCV used for video decoding.",
4605
+ "affected_versions": [
4606
+ "vllm < 0.14.1"
4607
+ ],
4608
+ "vector": "Unauthenticated network attacker submits a malicious video URL to a vLLM multimodal API endpoint; bundled FFmpeg JPEG2000 decoder triggers a heap overflow yielding RCE as the vLLM service user (commonly running with GPU + model-weight access).",
4609
+ "patch_available": true,
4610
+ "patch_required_reboot": false,
4611
+ "live_patch_available": false,
4612
+ "framework_control_gaps": {
4613
+ "NIST-800-53-SI-3": "Inference-server input validation not enumerated; multimodal-input surface novel to most AppSec programs.",
4614
+ "EU-AI-Act-Art15": "AI-system robustness controls reference adversarial inputs but not host RCE via multimodal decoder.",
4615
+ "ISO-IEC-42001-AIMS": "AI Management System standard lacks specific multimodal-input validation requirement.",
4616
+ "ATLAS-AML.T0048": "ML supply chain — bundled-codec attack surface inside inference servers."
4617
+ },
4618
+ "atlas_refs": [
4619
+ "AML.T0048",
4620
+ "AML.T0010"
4621
+ ],
4622
+ "attack_refs": [
4623
+ "T1190",
4624
+ "T1059"
4625
+ ],
4626
+ "rwep_factors": {
4627
+ "cisa_kev": 0,
4628
+ "poc_available": 20,
4629
+ "ai_factor": 0,
4630
+ "active_exploitation": 10,
4631
+ "blast_radius": 25,
4632
+ "patch_available": -15,
4633
+ "live_patch_available": 0,
4634
+ "reboot_required": 0
4635
+ },
4636
+ "rwep_score": 40,
4637
+ "verification_sources": [
4638
+ "https://www.ox.security/blog/cve-2026-22778-vllm-rce-vulnerability/",
4639
+ "https://github.com/vllm-project/vllm/security/advisories",
4640
+ "https://thecyberexpress.com/cve-2026-22778-vllm-rce-malicious-video-link/"
4641
+ ],
4642
+ "source_verified": "2026-05-18",
4643
+ "last_updated": "2026-05-18",
4644
+ "vendor_advisories": [
4645
+ {
4646
+ "vendor": "vLLM Project",
4647
+ "advisory_id": null,
4648
+ "url": "https://github.com/vllm-project/vllm/security/advisories",
4649
+ "severity": "critical",
4650
+ "published_date": "2026-01-15"
4651
+ }
4652
+ ],
4653
+ "discovery_attribution_note": "OX Security human research disclosure. Source: https://www.ox.security/blog/cve-2026-22778-vllm-rce-vulnerability/",
4654
+ "live_patch_tools": []
4655
+ },
4656
+ "CVE-2026-7482": {
4657
+ "id": "CVE-2026-7482",
4658
+ "name": "Ollama 'Bleeding Llama' Heap Memory Disclosure",
4659
+ "type": "out-of-bounds-read-disclosure",
4660
+ "cvss_score": 7.5,
4661
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
4662
+ "cisa_kev": false,
4663
+ "cisa_kev_date": null,
4664
+ "poc_available": true,
4665
+ "poc_description": "Crafted file upload to Ollama's model-quantization API causes out-of-bounds heap read; server process memory (potentially including model weights, conversation context, API keys) leaks to unauthenticated client.",
4666
+ "ai_discovered": false,
4667
+ "ai_discovery_source": "vendor_research",
4668
+ "ai_discovery_notes": "Coordinated disclosure to Ollama security team.",
4669
+ "ai_assisted_weaponization": false,
4670
+ "active_exploitation": "none",
4671
+ "affected": "Ollama < 0.17.1 across all platforms (Linux, macOS, Windows).",
4672
+ "affected_versions": [
4673
+ "ollama < 0.17.1"
4674
+ ],
4675
+ "vector": "Unauthenticated network attacker uploads a specially crafted file to the Ollama API endpoint; quantization pipeline reads beyond allocated bounds and returns heap contents in response.",
4676
+ "patch_available": true,
4677
+ "patch_required_reboot": false,
4678
+ "live_patch_available": false,
4679
+ "framework_control_gaps": {
4680
+ "NIST-800-53-AC-3": "Ollama ships with no default authentication; control assumes operator hardens deployment.",
4681
+ "EU-AI-Act-Art10": "Data-governance controls do not enumerate model-server memory-disclosure class.",
4682
+ "ISO-IEC-42001-AIMS": "AI management system lacks default-deny network exposure expectation for local-model servers.",
4683
+ "OWASP-LLM-Top-10-LLM06": "Sensitive information disclosure — class-applies."
4684
+ },
4685
+ "atlas_refs": [
4686
+ "AML.T0007"
4687
+ ],
4688
+ "attack_refs": [
4689
+ "T1005",
4690
+ "T1190"
4691
+ ],
4692
+ "rwep_factors": {
4693
+ "cisa_kev": 0,
4694
+ "poc_available": 20,
4695
+ "ai_factor": 0,
4696
+ "active_exploitation": 0,
4697
+ "blast_radius": 18,
4698
+ "patch_available": -15,
4699
+ "live_patch_available": 0,
4700
+ "reboot_required": 0
4701
+ },
4702
+ "rwep_score": 23,
4703
+ "verification_sources": [
4704
+ "https://github.com/ollama/ollama/security/advisories",
4705
+ "https://feedly.com/cve/vendors/ollama"
4706
+ ],
4707
+ "source_verified": "2026-05-18",
4708
+ "last_updated": "2026-05-18",
4709
+ "vendor_advisories": [
4710
+ {
4711
+ "vendor": "Ollama",
4712
+ "advisory_id": null,
4713
+ "url": "https://github.com/ollama/ollama/security/advisories",
4714
+ "severity": "high",
4715
+ "published_date": "2026-04-14"
4716
+ }
4717
+ ],
4718
+ "discovery_attribution_note": "Coordinated disclosure to Ollama security team. Source: https://github.com/ollama/ollama/security/advisories",
4719
+ "live_patch_tools": []
4720
+ },
4721
+ "CVE-2025-68664": {
4722
+ "id": "CVE-2025-68664",
4723
+ "name": "LangChain Core 'LangGrinch' Serialization Injection (Secret Extraction)",
4724
+ "type": "deserialization-injection",
4725
+ "cvss_score": 9.3,
4726
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
4727
+ "cisa_kev": false,
4728
+ "cisa_kev_date": null,
4729
+ "poc_available": true,
4730
+ "poc_description": "Cyata 'LangGrinch' writeup demonstrates end-to-end exploitation. dumps()/dumpd() do not escape free-form dictionaries containing the internal 'lc' key marker; attacker-controlled LLM response fields (additional_kwargs / response_metadata) are deserialized as legitimate LangChain objects, leaking secrets and enabling code execution paths.",
4731
+ "ai_discovered": false,
4732
+ "ai_discovery_source": "vendor_research",
4733
+ "ai_discovery_notes": "Cyata research team discovery via prompt-injection attack-surface analysis.",
4734
+ "ai_assisted_weaponization": true,
4735
+ "ai_assisted_notes": "Exploitation depends on prompt-injection triggering an LLM to emit a payload-shaped response — i.e. the LLM IS the weaponization primitive.",
4736
+ "active_exploitation": "suspected",
4737
+ "affected": "LangChain Core prior to 1.2.5 / 0.3.81. Affects any agent pipeline that serializes LLM responses (most production LangChain deployments).",
4738
+ "affected_versions": [
4739
+ "langchain-core < 1.2.5",
4740
+ "langchain-core < 0.3.81"
4741
+ ],
4742
+ "vector": "Prompt-injection-controlled LLM response content survives a dumps/dumpd → loads round-trip and is rehydrated as a LangChain object, enabling secret extraction and downstream RCE in pipelines that further evaluate the deserialized object.",
4743
+ "patch_available": true,
4744
+ "patch_required_reboot": false,
4745
+ "live_patch_available": false,
4746
+ "framework_control_gaps": {
4747
+ "NIST-AI-RMF-MEASURE-2.7": "Prompt-injection-driven serialization round-trip not in published AI-risk taxonomy.",
4748
+ "EU-AI-Act-Art15": "Robustness control does not enumerate serialization-deserialization chain as an attack surface.",
4749
+ "ISO-IEC-42001-AIMS-A.6.2.5": "Lifecycle controls do not include LLM-output trust-zone separation.",
4750
+ "OWASP-LLM-Top-10-LLM01": "Prompt Injection class — applies directly.",
4751
+ "OWASP-LLM-Top-10-LLM02": "Insecure output handling — applies directly."
4752
+ },
4753
+ "atlas_refs": [
4754
+ "AML.T0051",
4755
+ "AML.T0040"
4756
+ ],
4757
+ "attack_refs": [
4758
+ "T1059",
4759
+ "T1552"
4760
+ ],
4761
+ "rwep_factors": {
4762
+ "cisa_kev": 0,
4763
+ "poc_available": 20,
4764
+ "ai_factor": 15,
4765
+ "active_exploitation": 10,
4766
+ "blast_radius": 22,
4767
+ "patch_available": -15,
4768
+ "live_patch_available": 0,
4769
+ "reboot_required": 0
4770
+ },
4771
+ "rwep_score": 52,
4772
+ "verification_sources": [
4773
+ "https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/",
4774
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-68664",
4775
+ "https://thehackernews.com/2025/12/critical-langchain-core-vulnerability.html",
4776
+ "https://github.com/langchain-ai/langchain/security/advisories"
4777
+ ],
4778
+ "source_verified": "2026-05-18",
4779
+ "last_updated": "2026-05-18",
4780
+ "vendor_advisories": [
4781
+ {
4782
+ "vendor": "LangChain",
4783
+ "advisory_id": null,
4784
+ "url": "https://github.com/langchain-ai/langchain/security/advisories",
4785
+ "severity": "critical",
4786
+ "published_date": "2025-12-09"
4787
+ }
4788
+ ],
4789
+ "discovery_attribution_note": "Cyata research team discovery via prompt-injection attack-surface analysis. Source: https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/",
4790
+ "live_patch_tools": []
4791
+ },
4792
+ "CVE-2025-22224": {
4793
+ "id": "CVE-2025-22224",
4794
+ "name": "VMware ESXi/Workstation VMCI TOCTOU → VMX Host Code Execution",
4795
+ "type": "toctou-vm-escape",
4796
+ "cvss_score": 9.3,
4797
+ "cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
4798
+ "cisa_kev": true,
4799
+ "cisa_kev_date": "2025-03-04",
4800
+ "cisa_kev_due_date": "2025-03-25",
4801
+ "poc_available": true,
4802
+ "poc_description": "In-the-wild exploit observed by Microsoft Threat Intelligence prior to disclosure. Huntress reported PDB-path evidence (folder '2024_02_19') suggesting the exploit chain pre-dates disclosure by ~12 months. Used in ransomware operations per CISA February 2026 follow-up.",
4803
+ "ai_discovered": false,
4804
+ "ai_discovery_source": "vendor_research",
4805
+ "ai_discovery_notes": "Microsoft Threat Intelligence Center disclosure; no AI-tool attribution.",
4806
+ "ai_assisted_weaponization": false,
4807
+ "active_exploitation": "confirmed",
4808
+ "affected": "VMware ESXi 7.0, 8.0; VMware Workstation 17.x; VMware Fusion 13.x; Cloud Foundation 4.5/5.x; Telco Cloud Platform.",
4809
+ "affected_versions": [
4810
+ "esxi 7.0 < ESXi70U3s-24585291",
4811
+ "esxi 8.0 < ESXi80U3d-24585383 / ESXi80U2d-24585300",
4812
+ "workstation < 17.6.3",
4813
+ "fusion < 13.6.3"
4814
+ ],
4815
+ "vector": "Local administrative privilege on a guest VM exploits TOCTOU race in VMCI (Virtual Machine Communication Interface) leading to out-of-bounds write in the VMX host process — VM escape to hypervisor.",
4816
+ "patch_available": true,
4817
+ "patch_required_reboot": true,
4818
+ "live_patch_available": false,
4819
+ "framework_control_gaps": {
4820
+ "NIST-800-53-SC-39": "Hypervisor isolation control assumes guest-to-host boundary is intact; TOCTOU race breaks it.",
4821
+ "ISO-27001-2022-A.8.21": "Network segregation assumed at the virtualization layer; VM-escape sidesteps.",
4822
+ "PCI-DSS-4.0-2.2.3": "Multi-tenant segmentation premise violated.",
4823
+ "NIS2-Art21-business-continuity": "Hypervisor compromise blast radius covers all tenants on the host.",
4824
+ "FedRAMP-SC-7": "Boundary protection assumes hypervisor as trust anchor."
4825
+ },
4826
+ "atlas_refs": [],
4827
+ "attack_refs": [
4828
+ "T1611",
4829
+ "T1068"
4830
+ ],
4831
+ "rwep_factors": {
4832
+ "cisa_kev": 25,
4833
+ "poc_available": 20,
4834
+ "ai_factor": 0,
4835
+ "active_exploitation": 20,
4836
+ "blast_radius": 30,
4837
+ "patch_available": -15,
4838
+ "live_patch_available": 0,
4839
+ "reboot_required": 5
4840
+ },
4841
+ "rwep_score": 85,
4842
+ "verification_sources": [
4843
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-22224",
4844
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
4845
+ "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
4846
+ "https://www.bleepingcomputer.com/news/security/broadcom-fixes-three-vmware-zero-days-exploited-in-attacks/"
4847
+ ],
4848
+ "source_verified": "2026-05-18",
4849
+ "last_updated": "2026-05-18",
4850
+ "vendor_advisories": [
4851
+ {
4852
+ "vendor": "Broadcom (VMware)",
4853
+ "advisory_id": "VMSA-2025-0004",
4854
+ "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
4855
+ "severity": "critical",
4856
+ "published_date": "2025-03-04"
4857
+ }
4858
+ ],
4859
+ "discovery_attribution_note": "Microsoft Threat Intelligence Center disclosure; no AI-tool attribution. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-22224",
4860
+ "live_patch_tools": []
4861
+ },
4862
+ "CVE-2025-22225": {
4863
+ "id": "CVE-2025-22225",
4864
+ "name": "VMware ESXi Arbitrary Kernel Write (VM-escape chain, ransomware-active)",
4865
+ "type": "arbitrary-kernel-write-vm-escape",
4866
+ "cvss_score": 8.2,
4867
+ "cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
4868
+ "cisa_kev": true,
4869
+ "cisa_kev_date": "2025-03-04",
4870
+ "cisa_kev_due_date": "2025-03-25",
4871
+ "poc_available": true,
4872
+ "poc_description": "Active exploitation by ransomware groups confirmed by CISA in February 2026 follow-up. Chained with CVE-2025-22224 (TOCTOU) and CVE-2025-22226 (memory leak) for full VM-escape → hypervisor-management access.",
4873
+ "ai_discovered": false,
4874
+ "ai_discovery_source": "vendor_research",
4875
+ "ai_discovery_notes": "Microsoft Threat Intelligence Center co-disclosure.",
4876
+ "ai_assisted_weaponization": false,
4877
+ "active_exploitation": "confirmed",
4878
+ "affected": "VMware ESXi 7.0, 8.0; Cloud Foundation 4.5/5.x.",
4879
+ "affected_versions": [
4880
+ "esxi 7.0 < ESXi70U3s-24585291",
4881
+ "esxi 8.0 < ESXi80U3d-24585383"
4882
+ ],
4883
+ "vector": "Local attacker inside the VMX process exploits arbitrary kernel-write primitive to write to ESXi kernel memory and execute as the hypervisor.",
4884
+ "patch_available": true,
4885
+ "patch_required_reboot": true,
4886
+ "live_patch_available": false,
4887
+ "framework_control_gaps": {
4888
+ "NIST-800-53-SC-39": "Same hypervisor-isolation gap as CVE-2025-22224; ransomware-confirmed.",
4889
+ "PCI-DSS-4.0-2.2.3": "Multi-tenant assumption violated.",
4890
+ "ISO-27001-2022-A.8.21": "Network segregation assumed at the virtualization layer; chain breaks it.",
4891
+ "DORA-Art10": "ICT third-party concentration risk realized at the hypervisor layer."
4892
+ },
4893
+ "atlas_refs": [],
4894
+ "attack_refs": [
4895
+ "T1611",
4896
+ "T1068"
4897
+ ],
4898
+ "rwep_factors": {
4899
+ "cisa_kev": 25,
4900
+ "poc_available": 20,
4901
+ "ai_factor": 0,
4902
+ "active_exploitation": 20,
4903
+ "blast_radius": 30,
4904
+ "patch_available": -15,
4905
+ "live_patch_available": 0,
4906
+ "reboot_required": 5
4907
+ },
4908
+ "rwep_score": 85,
4909
+ "verification_sources": [
4910
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-22225",
4911
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
4912
+ "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
4913
+ "https://www.helpnetsecurity.com/2026/02/05/cisa-cve-2025-22225-ransomware-exploitation/"
4914
+ ],
4915
+ "source_verified": "2026-05-18",
4916
+ "last_updated": "2026-05-18",
4917
+ "vendor_advisories": [
4918
+ {
4919
+ "vendor": "Broadcom (VMware)",
4920
+ "advisory_id": "VMSA-2025-0004",
4921
+ "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
4922
+ "severity": "high",
4923
+ "published_date": "2025-03-04"
4924
+ }
4925
+ ],
4926
+ "discovery_attribution_note": "Microsoft Threat Intelligence Center co-disclosure. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-22225",
4927
+ "live_patch_tools": []
4928
+ },
4929
+ "CVE-2025-22226": {
4930
+ "id": "CVE-2025-22226",
4931
+ "name": "VMware ESXi HGFS Memory Leak (VM-escape chain helper)",
4932
+ "type": "information-disclosure-vm-escape",
4933
+ "cvss_score": 7.1,
4934
+ "cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
4935
+ "cisa_kev": true,
4936
+ "cisa_kev_date": "2025-03-04",
4937
+ "cisa_kev_due_date": "2025-03-25",
4938
+ "poc_available": true,
4939
+ "poc_description": "Third-in-chain CVE in the VMSA-2025-0004 cluster; HGFS (Host Guest File System) memory leak provides the heap-address oracle used to weaponize CVE-2025-22224 + CVE-2025-22225. Active exploitation confirmed by Broadcom as 'observed in attacks'.",
4940
+ "ai_discovered": false,
4941
+ "ai_discovery_source": "vendor_research",
4942
+ "ai_discovery_notes": "Microsoft Threat Intelligence Center co-disclosure.",
4943
+ "ai_assisted_weaponization": false,
4944
+ "active_exploitation": "confirmed",
4945
+ "affected": "VMware ESXi 7.0, 8.0; Workstation 17.x; Fusion 13.x.",
4946
+ "affected_versions": [
4947
+ "esxi 7.0 < ESXi70U3s-24585291",
4948
+ "esxi 8.0 < ESXi80U3d-24585383",
4949
+ "workstation < 17.6.3",
4950
+ "fusion < 13.6.3"
4951
+ ],
4952
+ "vector": "Local guest-admin reads VMX-process memory via HGFS leak primitive; supplies heap addresses for the TOCTOU + arbitrary-write CVEs in the same chain.",
4953
+ "patch_available": true,
4954
+ "patch_required_reboot": true,
4955
+ "live_patch_available": false,
4956
+ "framework_control_gaps": {
4957
+ "NIST-800-53-SC-28": "Memory-protection control assumes process isolation; leak escapes.",
4958
+ "ISO-27001-2022-A.8.24": "In-transit / at-rest crypto irrelevant to in-memory disclosure.",
4959
+ "FedRAMP-SC-4": "Information in shared resources — direct violation."
4960
+ },
4961
+ "atlas_refs": [],
4962
+ "attack_refs": [
4963
+ "T1005",
4964
+ "T1611"
4965
+ ],
4966
+ "rwep_factors": {
4967
+ "cisa_kev": 25,
4968
+ "poc_available": 20,
4969
+ "ai_factor": 0,
4970
+ "active_exploitation": 20,
4971
+ "blast_radius": 25,
4972
+ "patch_available": -15,
4973
+ "live_patch_available": 0,
4974
+ "reboot_required": 5
4975
+ },
4976
+ "rwep_score": 80,
4977
+ "verification_sources": [
4978
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-22226",
4979
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
4980
+ "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
4981
+ ],
4982
+ "source_verified": "2026-05-18",
4983
+ "last_updated": "2026-05-18",
4984
+ "vendor_advisories": [
4985
+ {
4986
+ "vendor": "Broadcom (VMware)",
4987
+ "advisory_id": "VMSA-2025-0004",
4988
+ "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
4989
+ "severity": "high",
4990
+ "published_date": "2025-03-04"
4991
+ }
4992
+ ],
4993
+ "discovery_attribution_note": "Microsoft Threat Intelligence Center co-disclosure. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-22226",
4994
+ "live_patch_tools": []
4995
+ },
4996
+ "MAL-2024-PYPI-ULTRALYTICS-XMRIG": {
4997
+ "id": "MAL-2024-PYPI-ULTRALYTICS-XMRIG",
4998
+ "name": "ultralytics PyPI Compromise → XMRig Cryptominer (60M-download AI library)",
4999
+ "type": "supply-chain-cryptominer",
5000
+ "cvss_score": 8.6,
5001
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H",
5002
+ "cvss_correction_note": "No NVD CVE assigned; CVSS synthesized per OSSF Malicious-Packages convention for an unauthenticated post-install code-execution against a ~60M-download package. UI:R because developer / CI must run `pip install`. S:C because compromised model-training environments exfiltrate training data / weights / cloud credentials.",
5003
+ "cisa_kev": false,
5004
+ "cisa_kev_date": null,
5005
+ "kev_scope_note": "CISA KEV scope excludes ecosystem-package compromises without assigned CVE.",
5006
+ "poc_available": true,
5007
+ "poc_description": "Live malicious payload in ultralytics 8.3.41 and 8.3.42 (the first 'remediation' release inadvertently re-shipped the malicious code). XMRig cryptominer downloaded post-install via downloader code injected through a GitHub Actions script-injection in the build environment by openimbot.",
5008
+ "ai_discovered": false,
5009
+ "ai_discovery_source": "vendor_research",
5010
+ "ai_discovery_notes": "ReversingLabs + Wiz + HiddenLayer concurrent ecosystem-telemetry detection.",
5011
+ "ai_assisted_weaponization": false,
5012
+ "active_exploitation": "confirmed",
5013
+ "affected": "ultralytics 8.3.41 and 8.3.42 on PyPI (~60M monthly downloads, 30k+ GitHub stars). Clean release: 8.3.43.",
5014
+ "affected_versions": [
5015
+ "ultralytics==8.3.41",
5016
+ "ultralytics==8.3.42"
5017
+ ],
5018
+ "vector": "GitHub Actions script-injection enabled openimbot to inject post-install downloader after code review; resulting wheel pulled XMRig from attacker infrastructure. Connection attribution: Hong Kong (per ultralytics maintainer disclosure).",
5019
+ "patch_available": true,
5020
+ "patch_required_reboot": false,
5021
+ "live_patch_available": false,
5022
+ "framework_control_gaps": {
5023
+ "NIST-800-218-SSDF-PO.4.2": "Build-environment hardening guidance generic; GitHub Actions script-injection class persists.",
5024
+ "SLSA-3": "Build provenance attestation gap.",
5025
+ "ISO-27001-2022-A.8.30": "Outsourced development control doesn't specifically address ecosystem-package build-pipeline injection.",
5026
+ "EU-AI-Act-Art10": "Data governance — compromised AI library is in-scope but framework lacks supply-chain control prescription.",
5027
+ "OpenSSF-Scorecard-PinnedDependenciesID": "Float-version installs propagate compromise instantly across consumer base."
5028
+ },
5029
+ "atlas_refs": [
5030
+ "AML.T0010",
5031
+ "AML.T0011"
5032
+ ],
5033
+ "attack_refs": [
5034
+ "T1195.002",
5035
+ "T1496"
5036
+ ],
5037
+ "rwep_factors": {
5038
+ "cisa_kev": 0,
5039
+ "poc_available": 20,
5040
+ "ai_factor": 0,
5041
+ "active_exploitation": 20,
5042
+ "blast_radius": 28,
5043
+ "patch_available": -15,
5044
+ "live_patch_available": 0,
5045
+ "reboot_required": 0
5046
+ },
5047
+ "rwep_score": 53,
5048
+ "verification_sources": [
5049
+ "https://www.reversinglabs.com/blog/compromised-ultralytics-pypi-package-delivers-crypto-coinminer",
5050
+ "https://www.wiz.io/blog/ultralytics-ai-library-hacked-via-github-for-cryptomining",
5051
+ "https://hiddenlayer.com/innovation-hub/ultralytics-python-package-compromise-deploys-cryptominer",
5052
+ "https://github.com/ultralytics/ultralytics/security/advisories"
5053
+ ],
5054
+ "source_verified": "2026-05-18",
5055
+ "last_updated": "2026-05-18",
5056
+ "vendor_advisories": [
5057
+ {
5058
+ "vendor": "Ultralytics",
5059
+ "advisory_id": null,
5060
+ "url": "https://github.com/ultralytics/ultralytics/security/advisories",
5061
+ "severity": "critical",
5062
+ "published_date": "2024-12-05"
5063
+ }
5064
+ ],
5065
+ "discovery_attribution_note": "ReversingLabs + Wiz + HiddenLayer concurrent ecosystem-telemetry detection. Source: https://www.reversinglabs.com/blog/compromised-ultralytics-pypi-package-delivers-crypto-coinminer",
5066
+ "live_patch_tools": []
5067
+ },
5068
+ "MAL-2026-RUBYGEMS-BUFFERZONECORP-SLEEPER": {
5069
+ "id": "MAL-2026-RUBYGEMS-BUFFERZONECORP-SLEEPER",
5070
+ "name": "BufferZoneCorp RubyGems + Go Module Sleeper-to-Payload Credential Theft Campaign",
5071
+ "type": "supply-chain-credential-stealer-multi-ecosystem",
5072
+ "cvss_score": 9.1,
5073
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
5074
+ "cvss_correction_note": "No NVD CVE assigned; CVSS synthesized per OSSF Malicious-Packages convention. AV:N because payload reaches victims via RubyGems / Go module proxies. UI:R because CI / developer must run `bundle install` / `go get`. S:C because exfiltrated SSH keys, AWS creds, .npmrc, .netrc, GitHub CLI config, and RubyGems credentials extend blast radius beyond consuming process.",
5075
+ "cisa_kev": false,
5076
+ "cisa_kev_date": null,
5077
+ "kev_scope_note": "CISA KEV scope excludes ecosystem-package compromises without assigned CVE.",
5078
+ "poc_available": true,
5079
+ "poc_description": "Live malicious packages — Ruby gems harvested env vars + SSH keys + AWS credentials + .npmrc + .netrc + GitHub CLI config + RubyGems credentials to a hidden C2 endpoint. Go modules modified GITHUB_ENV, poisoned GOPROXY, weakened checksum protections, tampered with go.sum, and planted fake `go` wrappers in workflow execution paths.",
5080
+ "ai_discovered": false,
5081
+ "ai_discovery_source": "vendor_research",
5082
+ "ai_discovery_notes": "Socket.dev research disclosure; concurrent reporting by other supply-chain firms.",
5083
+ "ai_assisted_weaponization": false,
5084
+ "active_exploitation": "confirmed",
5085
+ "affected": "Ruby gems and Go modules published by GitHub account 'BufferZoneCorp' impersonating activesupport-logger, devise-jwt, go-retryablehttp, grpc-client, config-loader and similar utility brands. Packages have been yanked from RubyGems; Go modules blocked.",
5086
+ "affected_versions": [
5087
+ "activesupport-logger (BufferZoneCorp)",
5088
+ "devise-jwt (BufferZoneCorp)",
5089
+ "go-retryablehttp (BufferZoneCorp typosquat)",
5090
+ "grpc-client (BufferZoneCorp typosquat)",
5091
+ "config-loader (BufferZoneCorp typosquat)"
5092
+ ],
5093
+ "vector": "Sleeper-to-payload — packages published with clean README + minimal functionality, silently updated to malicious payload after trust accrual. Targets CI pipelines for credential theft + GitHub Actions tampering + SSH persistence.",
5094
+ "patch_available": true,
5095
+ "patch_required_reboot": false,
5096
+ "live_patch_available": false,
5097
+ "framework_control_gaps": {
5098
+ "NIST-800-218-SSDF-PO.4.2": "Sleeper pattern defeats one-time package audit.",
5099
+ "SLSA-3": "Build provenance ineffective against post-trust-accrual malicious update.",
5100
+ "ISO-27001-2022-A.5.21": "Supplier security control depends on initial assessment; doesn't address temporal trust drift.",
5101
+ "OpenSSF-Scorecard-PinnedDependenciesID": "Pinned dependency mitigates only if hash-pinned, not version-pinned.",
5102
+ "PCI-DSS-4.0-6.3.2": "Bespoke / custom software inventory excludes transitive dependencies.",
5103
+ "NIS2-Art21-supply-chain": "Supply-chain control assumes initial vetting; sleeper pattern not enumerated."
5104
+ },
5105
+ "atlas_refs": [
5106
+ "AML.T0010"
5107
+ ],
5108
+ "attack_refs": [
5109
+ "T1195.002",
5110
+ "T1552",
5111
+ "T1078.004"
5112
+ ],
5113
+ "rwep_factors": {
5114
+ "cisa_kev": 0,
5115
+ "poc_available": 20,
5116
+ "ai_factor": 0,
5117
+ "active_exploitation": 20,
5118
+ "blast_radius": 25,
5119
+ "patch_available": -15,
5120
+ "live_patch_available": 0,
5121
+ "reboot_required": 0
5122
+ },
5123
+ "rwep_score": 50,
5124
+ "verification_sources": [
5125
+ "https://socket.dev/blog/malicious-ruby-gems-and-go-modules-steal-secrets-poison-ci",
5126
+ "https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html",
5127
+ "https://thehackernews.com/2026/05/rubygems-suspends-new-signups-after.html"
5128
+ ],
5129
+ "source_verified": "2026-05-18",
5130
+ "last_updated": "2026-05-18",
5131
+ "vendor_advisories": [
5132
+ {
5133
+ "vendor": "RubyGems",
5134
+ "advisory_id": null,
5135
+ "url": "https://blog.rubygems.org/",
5136
+ "severity": "critical",
5137
+ "published_date": "2026-05-12"
5138
+ }
5139
+ ],
5140
+ "discovery_attribution_note": "Socket.dev research disclosure; concurrent reporting by other supply-chain firms. Source: https://socket.dev/blog/malicious-ruby-gems-and-go-modules-steal-secrets-poison-ci",
5141
+ "live_patch_tools": []
5142
+ },
5143
+ "MAL-2025-PYPI-COLORAMA-SOLANA-STEALER": {
5144
+ "id": "MAL-2025-PYPI-COLORAMA-SOLANA-STEALER",
5145
+ "name": "PyPI Colorama Typosquat Campaign → Solana Credential / Crypto Stealer",
5146
+ "type": "supply-chain-typosquat-credential-stealer",
5147
+ "cvss_score": 8.6,
5148
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
5149
+ "cvss_correction_note": "No NVD CVE assigned; CVSS synthesized per OSSF Malicious-Packages convention for typosquat campaign with confirmed credential exfiltration + cryptocurrency wallet theft. UI:R because developer must `pip install` the typosquat. S:C because exfiltrated browser data + crypto wallet keys + Solana ecosystem credentials extend blast radius beyond install host.",
5150
+ "cisa_kev": false,
5151
+ "cisa_kev_date": null,
5152
+ "kev_scope_note": "CISA KEV excludes ecosystem-package compromises without assigned CVE.",
5153
+ "poc_available": true,
5154
+ "poc_description": "11 PyPI packages published by a single threat actor between 2025-05-04 and 2025-05-24, split across four payload variants targeting the Solana ecosystem (browser-stored credentials, crypto wallets, sensitive session cookies). Multiple downstream variants — coloramapkgsw, coloramapkgsdow, coloramashowtemp, coloramapkgs, readmecolorama, colorizator, coloraiz, and related — extend the colorama / colorizr typosquat pattern.",
5155
+ "ai_discovered": false,
5156
+ "ai_discovery_source": "vendor_research",
5157
+ "ai_discovery_notes": "Imperva Threat Research + Checkmarx + Check Point ecosystem-telemetry detection.",
5158
+ "ai_assisted_weaponization": false,
5159
+ "active_exploitation": "confirmed",
5160
+ "affected": "PyPI typosquats of `colorama` (one of the most-installed Python packages, >150M downloads/month) and `colorizr`. Multiple variants since 2024; the May 2025 cluster specifically targeted Solana credentials.",
5161
+ "affected_versions": [
5162
+ "coloramapkgsw (all versions)",
5163
+ "coloramapkgsdow (all versions)",
5164
+ "coloramashowtemp (all versions)",
5165
+ "coloramapkgs (all versions)",
5166
+ "readmecolorama (all versions)",
5167
+ "colorizator (all versions)",
5168
+ "coloraiz (all versions)"
5169
+ ],
5170
+ "vector": "Developer typing `pip install colorama` mistypes / autocompletes onto a typosquat; install-time code exfiltrates browser-stored credentials, crypto wallets, Facebook/Telegram/Roblox session material, and Solana wallet artifacts.",
5171
+ "patch_available": true,
5172
+ "patch_required_reboot": false,
5173
+ "live_patch_available": false,
5174
+ "framework_control_gaps": {
5175
+ "NIST-800-218-SSDF-PO.4.2": "Typosquat detection not enumerated in standard SSDF practices.",
5176
+ "ISO-27001-2022-A.5.21": "Supplier control doesn't address ecosystem-name-confusion class.",
5177
+ "OpenSSF-Scorecard-PinnedDependenciesID": "Pin-by-hash mitigates only at deploy time; install-time typosquat persists.",
5178
+ "GDPR-Art32": "Confidentiality breach via developer-endpoint compromise underspecified."
5179
+ },
5180
+ "atlas_refs": [],
5181
+ "attack_refs": [
5182
+ "T1195.002",
5183
+ "T1552",
5184
+ "T1657"
5185
+ ],
5186
+ "rwep_factors": {
5187
+ "cisa_kev": 0,
5188
+ "poc_available": 20,
5189
+ "ai_factor": 0,
5190
+ "active_exploitation": 20,
5191
+ "blast_radius": 20,
5192
+ "patch_available": -15,
5193
+ "live_patch_available": 0,
5194
+ "reboot_required": 0
5195
+ },
5196
+ "rwep_score": 45,
5197
+ "verification_sources": [
5198
+ "https://www.imperva.com/blog/pythons-colorama-typosquatting-meets-fade-stealer-malware/",
5199
+ "https://checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/",
5200
+ "https://blog.checkpoint.com/securing-the-cloud/pypi-inundated-by-malicious-typosquatting-campaign/",
5201
+ "https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html"
5202
+ ],
5203
+ "source_verified": "2026-05-18",
5204
+ "last_updated": "2026-05-18",
5205
+ "vendor_advisories": [
5206
+ {
5207
+ "vendor": "PyPI",
5208
+ "advisory_id": null,
5209
+ "url": "https://pypi.org/security/",
5210
+ "severity": "high",
5211
+ "published_date": "2025-05-25"
5212
+ }
5213
+ ],
5214
+ "discovery_attribution_note": "Imperva Threat Research + Checkmarx + Check Point ecosystem-telemetry detection. Source: https://www.imperva.com/blog/pythons-colorama-typosquatting-meets-fade-stealer-malware/",
5215
+ "live_patch_tools": []
5216
+ },
5217
+ "CVE-2025-0133": {
5218
+ "id": "CVE-2025-0133",
5219
+ "name": "Palo Alto Networks GlobalProtect Reflected XSS (XBOW AI-discovered)",
5220
+ "type": "reflected-xss-captive-portal",
5221
+ "cvss_score": 5.1,
5222
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
5223
+ "cisa_kev": false,
5224
+ "cisa_kev_date": null,
5225
+ "poc_available": true,
5226
+ "poc_description": "XBOW writeup includes the discovery methodology; reflected XSS payload triggered via crafted link processed by GlobalProtect captive-portal. Allows execution of JavaScript in authenticated user's browser context enabling credential-phishing that originates from the legitimate VPN portal hostname.",
5227
+ "ai_discovered": true,
5228
+ "ai_discovery_source": "bug_bounty_ai_augmented",
5229
+ "ai_discovery_date": "2025-05-14",
5230
+ "ai_discovery_notes": "Discovered autonomously by XBOW autonomous-pentest AI during a HackerOne bug-bounty engagement scoped to the GlobalProtect web application. Notable because XBOW reached #1 on HackerOne US Q2 2025 leaderboard ahead of all human researchers in the same Vulnerability Disclosure Program ranking. Discovery affected over 2,000 internet-facing hosts at disclosure time.",
5231
+ "ai_assisted_weaponization": false,
5232
+ "active_exploitation": "none",
5233
+ "affected": "PAN-OS GlobalProtect gateway and portal. Cloud NGFW (all versions), PAN-OS 11.2 < 11.2.7, PAN-OS 11.1 < 11.1.11, PAN-OS 10.2 < 10.2.17, PAN-OS 10.1 (all versions, EoL — no fix).",
5234
+ "affected_versions": [
5235
+ "pan-os 11.2 < 11.2.7",
5236
+ "pan-os 11.1 < 11.1.11",
5237
+ "pan-os 10.2 < 10.2.17",
5238
+ "pan-os 10.1 (all)"
5239
+ ],
5240
+ "vector": "Authenticated captive-portal user clicks crafted link; reflected XSS executes JavaScript inside the GlobalProtect portal origin enabling session theft / credential phishing.",
5241
+ "patch_available": true,
5242
+ "patch_required_reboot": false,
5243
+ "live_patch_available": false,
5244
+ "framework_control_gaps": {
5245
+ "NIST-800-53-SI-10": "Input validation control assumes static-analysis coverage; AI-discovery surfaced bugs missed by conventional tooling.",
5246
+ "ISO-27001-2022-A.8.28": "Secure coding controls do not enumerate AI-assisted discovery as a positive defense modality.",
5247
+ "OWASP-Top-10-2021-A03": "Injection class — XSS in security-control-plane software.",
5248
+ "EU-AI-Act-Art15": "Robustness control does not address AI-assisted-discovery contribution credit."
5249
+ },
5250
+ "atlas_refs": [],
5251
+ "attack_refs": [
5252
+ "T1059.007",
5253
+ "T1539"
5254
+ ],
5255
+ "rwep_factors": {
5256
+ "cisa_kev": 0,
5257
+ "poc_available": 20,
5258
+ "ai_factor": 15,
5259
+ "active_exploitation": 0,
5260
+ "blast_radius": 18,
5261
+ "patch_available": -15,
5262
+ "live_patch_available": 0,
5263
+ "reboot_required": 0
5264
+ },
5265
+ "rwep_score": 38,
5266
+ "verification_sources": [
5267
+ "https://security.paloaltonetworks.com/CVE-2025-0133",
5268
+ "https://xbow.com/blog/xbow-globalprotect-xss",
5269
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-0133"
5270
+ ],
5271
+ "source_verified": "2026-05-18",
5272
+ "last_updated": "2026-05-18",
5273
+ "vendor_advisories": [
5274
+ {
5275
+ "vendor": "Palo Alto Networks",
5276
+ "advisory_id": "PAN-SA-2025-0001",
5277
+ "url": "https://security.paloaltonetworks.com/CVE-2025-0133",
5278
+ "severity": "medium",
5279
+ "published_date": "2025-05-14"
5280
+ }
5281
+ ],
5282
+ "discovery_attribution_note": "AI-surfaced by XBOW autonomous-pentest agent during HackerOne VDP engagement. First publicly-attributed AI-tool CVE against Palo Alto. Hard Rule #7 anchor.",
5283
+ "live_patch_tools": []
5284
+ },
5285
+ "CVE-2025-59529": {
5286
+ "id": "CVE-2025-59529",
5287
+ "name": "Avahi Simple Protocol Server Connection-Limit DoS (ZeroPath AI-discovered)",
5288
+ "type": "business-logic-dos",
5289
+ "cvss_score": 6.5,
5290
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
5291
+ "cisa_kev": false,
5292
+ "cisa_kev_date": null,
5293
+ "poc_available": true,
5294
+ "poc_description": "ZeroPath writeup includes reproduction details; avahi-daemon Simple Protocol Server continues accepting clients after the configured connection limit should have engaged, allowing local resource exhaustion via repeated connections.",
5295
+ "ai_discovered": true,
5296
+ "ai_discovery_source": "bug_bounty_ai_augmented",
5297
+ "ai_discovery_date": "2025-09-23",
5298
+ "ai_discovery_notes": "Discovered by ZeroPath's AI-powered SAST during code analysis of the Avahi project. Classified as a business-logic vulnerability — the type that traditional pattern-based SAST tools typically miss. Part of ZeroPath's broader portfolio of AI-discovered CVEs spanning Avahi, curl, and other infrastructure components.",
5299
+ "ai_assisted_weaponization": false,
5300
+ "active_exploitation": "none",
5301
+ "affected": "Avahi (mDNS / DNS-SD service-discovery daemon) deployed with Simple Protocol Server enabled; ubiquitous on Linux desktops, IoT devices, and embedded systems.",
5302
+ "affected_versions": [
5303
+ "avahi pre-fix"
5304
+ ],
5305
+ "vector": "Local or network-reachable attacker (where avahi-daemon is exposed) opens repeated Simple Protocol connections; daemon ignores connection-cap configuration and exhausts file descriptors / memory, denying service-discovery on the host.",
5306
+ "patch_available": true,
5307
+ "patch_required_reboot": false,
5308
+ "live_patch_available": false,
5309
+ "framework_control_gaps": {
5310
+ "NIST-800-53-SC-5": "Default-allow connection acceptance behaviour escapes generic DoS-protection control.",
5311
+ "ISO-27001-2022-A.8.9": "Configuration baseline assumes configured-limit-enforced; business-logic bypass not enumerated.",
5312
+ "ENISA-IoT-security-baseline": "IoT-device service-discovery hardening unspecified for business-logic class.",
5313
+ "EU-AI-Act-Art15": "Framework does not credit AI-assisted-defender finding."
5314
+ },
5315
+ "atlas_refs": [],
5316
+ "attack_refs": [
5317
+ "T1499.002"
5318
+ ],
5319
+ "rwep_factors": {
5320
+ "cisa_kev": 0,
5321
+ "poc_available": 20,
5322
+ "ai_factor": 15,
5323
+ "active_exploitation": 0,
5324
+ "blast_radius": 15,
5325
+ "patch_available": -15,
5326
+ "live_patch_available": 0,
5327
+ "reboot_required": 0
5328
+ },
5329
+ "rwep_score": 35,
5330
+ "verification_sources": [
5331
+ "https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529",
5332
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-59529",
5333
+ "https://github.com/avahi/avahi/security/advisories"
5334
+ ],
5335
+ "source_verified": "2026-05-18",
5336
+ "last_updated": "2026-05-18",
5337
+ "vendor_advisories": [
5338
+ {
5339
+ "vendor": "Avahi",
5340
+ "advisory_id": null,
5341
+ "url": "https://github.com/avahi/avahi/security/advisories",
5342
+ "severity": "medium",
5343
+ "published_date": "2025-09-23"
5344
+ }
5345
+ ],
5346
+ "discovery_attribution_note": "AI-surfaced by ZeroPath SAST agent. Notable as a business-logic class detection — the category most resistant to conventional SAST and most accelerated by LLM-driven analysis. Hard Rule #7 anchor.",
5347
+ "live_patch_tools": []
5348
+ },
5349
+ "CVE-2025-55319": {
5350
+ "id": "CVE-2025-55319",
5351
+ "name": "Visual Studio Code Agentic-AI Command Injection (ZeroPath AI-discovered)",
5352
+ "type": "command-injection-agentic",
5353
+ "cvss_score": 7.4,
5354
+ "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
5355
+ "cisa_kev": false,
5356
+ "cisa_kev_date": null,
5357
+ "poc_available": true,
5358
+ "poc_description": "ZeroPath writeup demonstrates command-injection path through VS Code's agentic-AI integration where adversarial tool / instruction content reaches a shell execution primitive.",
5359
+ "ai_discovered": true,
5360
+ "ai_discovery_source": "bug_bounty_ai_augmented",
5361
+ "ai_discovery_date": "2025-09-09",
5362
+ "ai_discovery_notes": "Discovered and reported by ZeroPath AI-SAST analyzing the VS Code agentic-AI surface. Notable because the discovered bug exists IN the AI-tooling integration layer — AI defender finding bugs in AI-assistant surfaces.",
5363
+ "ai_assisted_weaponization": true,
5364
+ "ai_assisted_notes": "Exploitation can be triggered by adversarial content in tool responses or MCP server messages — i.e. the AI agent IS the weaponization primitive that escalates a crafted input into a shell command.",
5365
+ "active_exploitation": "none",
5366
+ "affected": "Visual Studio Code agentic-AI feature surface prior to vendor fix; affects developer workstations using GitHub Copilot Chat / MCP-integrated AI agents inside VS Code.",
5367
+ "affected_versions": [
5368
+ "vscode pre-fix"
5369
+ ],
5370
+ "vector": "Adversarial content in an AI tool response or external MCP server message reaches a shell-execution primitive inside VS Code's agentic integration, executing attacker-controlled commands as the developer.",
5371
+ "patch_available": true,
5372
+ "patch_required_reboot": false,
5373
+ "live_patch_available": false,
5374
+ "framework_control_gaps": {
5375
+ "NIST-AI-RMF-MEASURE-2.7": "Prompt-injection-to-shell pathway underspecified in AI-RMF measurement guidance.",
5376
+ "EU-AI-Act-Art15": "Agentic-AI host-execution boundary not enumerated as a robustness control.",
5377
+ "ISO-IEC-42001-AIMS-A.6.2.5": "AI lifecycle controls don't address IDE-resident agentic primitives.",
5378
+ "OWASP-LLM-Top-10-LLM01": "Prompt Injection — directly applicable.",
5379
+ "OWASP-LLM-Top-10-LLM05": "Improper Output Handling — directly applicable.",
5380
+ "OWASP-LLM-Top-10-LLM07": "Insecure Plugin Design — directly applicable to MCP integration class."
5381
+ },
5382
+ "atlas_refs": [
5383
+ "AML.T0051"
5384
+ ],
5385
+ "attack_refs": [
5386
+ "T1059"
5387
+ ],
5388
+ "rwep_factors": {
5389
+ "cisa_kev": 0,
5390
+ "poc_available": 20,
5391
+ "ai_factor": 15,
5392
+ "active_exploitation": 0,
5393
+ "blast_radius": 20,
5394
+ "patch_available": -15,
5395
+ "live_patch_available": 0,
5396
+ "reboot_required": 0
5397
+ },
5398
+ "rwep_score": 40,
5399
+ "verification_sources": [
5400
+ "https://zeropath.com/blog/cve-2025-55319-agentic-ai-vscode-command-injection",
5401
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55319",
5402
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-55319"
5403
+ ],
5404
+ "source_verified": "2026-05-18",
5405
+ "last_updated": "2026-05-18",
5406
+ "vendor_advisories": [
5407
+ {
5408
+ "vendor": "Microsoft",
5409
+ "advisory_id": "CVE-2025-55319",
5410
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55319",
5411
+ "severity": "high",
5412
+ "published_date": "2025-09-09"
5413
+ }
5414
+ ],
5415
+ "discovery_attribution_note": "AI-surfaced by ZeroPath. Doubly-relevant: AI-defender finds bug in AI-agentic IDE integration. ai_assisted_weaponization=true because the AI agent IS the weaponization primitive — qualifies under both Hard Rule #7 limbs.",
5416
+ "live_patch_tools": []
5417
+ },
5418
+ "CVE-2025-53767": {
5419
+ "id": "CVE-2025-53767",
5420
+ "name": "Azure OpenAI SSRF Privilege Escalation (ZeroPath AI-discovered)",
5421
+ "type": "ssrf-privilege-escalation",
5422
+ "cvss_score": 8.7,
5423
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
5424
+ "cisa_kev": false,
5425
+ "cisa_kev_date": null,
5426
+ "poc_available": false,
5427
+ "poc_description": "ZeroPath writeup details SSRF chain in Azure OpenAI service surface enabling privilege escalation. Microsoft fixed server-side before public PoC; no operator-side reproduction available post-fix.",
5428
+ "ai_discovered": true,
5429
+ "ai_discovery_source": "bug_bounty_ai_augmented",
5430
+ "ai_discovery_date": "2025-08-19",
5431
+ "ai_discovery_notes": "Discovered by ZeroPath AI agent analyzing Azure OpenAI service attack surface. Fixed in Microsoft-managed cloud service; no operator action required post-patch.",
5432
+ "ai_assisted_weaponization": false,
5433
+ "active_exploitation": "none",
5434
+ "affected": "Azure OpenAI service (Microsoft-managed cloud). Pre-2025-08-19 service state.",
5435
+ "affected_versions": [
5436
+ "azure-openai pre-2025-08-19"
5437
+ ],
5438
+ "vector": "Authenticated low-privilege tenant user issues SSRF request that crosses the cloud-tenant boundary, escalating into administrative or cross-tenant context within the Azure OpenAI control plane.",
5439
+ "patch_available": true,
5440
+ "patch_required_reboot": false,
5441
+ "live_patch_available": false,
5442
+ "framework_control_gaps": {
5443
+ "NIST-800-53-SC-7": "Boundary protection assumes east-west traffic within cloud-tenant boundary is filtered; SSRF crosses it.",
5444
+ "FedRAMP-AC-4": "Information flow control assumed tenant-isolated.",
5445
+ "EU-AI-Act-Art15": "Robustness control does not enumerate AI-service control-plane SSRF.",
5446
+ "OWASP-Top-10-2021-A10": "SSRF — directly applicable.",
5447
+ "ISO-IEC-42001-AIMS": "AI Management System silent on managed-AI-service supply chain risk."
5448
+ },
5449
+ "atlas_refs": [
5450
+ "AML.T0024",
5451
+ "AML.T0047"
5452
+ ],
5453
+ "attack_refs": [
5454
+ "T1190",
5455
+ "T1078.004"
5456
+ ],
5457
+ "rwep_factors": {
5458
+ "cisa_kev": 0,
5459
+ "poc_available": 0,
5460
+ "ai_factor": 15,
5461
+ "active_exploitation": 0,
5462
+ "blast_radius": 22,
5463
+ "patch_available": -15,
5464
+ "live_patch_available": 0,
5465
+ "reboot_required": 0
5466
+ },
5467
+ "rwep_score": 22,
5468
+ "verification_sources": [
5469
+ "https://zeropath.com/blog/cve-2025-53767",
5470
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767",
5471
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-53767"
5472
+ ],
5473
+ "source_verified": "2026-05-18",
5474
+ "last_updated": "2026-05-18",
5475
+ "vendor_advisories": [
5476
+ {
5477
+ "vendor": "Microsoft",
5478
+ "advisory_id": "CVE-2025-53767",
5479
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767",
5480
+ "severity": "critical",
5481
+ "published_date": "2025-08-19"
5482
+ }
5483
+ ],
5484
+ "discovery_attribution_note": "AI-surfaced by ZeroPath against Azure OpenAI control plane. Hard Rule #7 anchor and identity-class adjacent (cloud-tenant control plane).",
5485
+ "live_patch_tools": []
5486
+ },
5487
+ "CVE-2025-10725": {
5488
+ "id": "CVE-2025-10725",
5489
+ "name": "Red Hat OpenShift AI Privilege Escalation (ZeroPath AI-discovered)",
5490
+ "type": "privilege-escalation-rbac",
5491
+ "cvss_score": 8.1,
5492
+ "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
5493
+ "cisa_kev": false,
5494
+ "cisa_kev_date": null,
5495
+ "poc_available": false,
5496
+ "poc_description": "ZeroPath writeup details RBAC privilege-escalation primitive in OpenShift AI control plane. Vendor patched before publishing PoC artifacts.",
5497
+ "ai_discovered": true,
5498
+ "ai_discovery_source": "bug_bounty_ai_augmented",
5499
+ "ai_discovery_date": "2025-09-29",
5500
+ "ai_discovery_notes": "Discovered by ZeroPath AI agent analyzing OpenShift AI integration surface. Highlights the AI-platform supply chain class — AI-defender finding bugs in AI-deployment platforms.",
5501
+ "ai_assisted_weaponization": false,
5502
+ "active_exploitation": "none",
5503
+ "affected": "Red Hat OpenShift AI prior to vendor fix; affects managed-Kubernetes AI deployments.",
5504
+ "affected_versions": [
5505
+ "openshift-ai pre-fix"
5506
+ ],
5507
+ "vector": "Authenticated low-privilege tenant user leverages RBAC primitive to escalate privileges across the OpenShift AI control-plane boundary.",
5508
+ "patch_available": true,
5509
+ "patch_required_reboot": false,
5510
+ "live_patch_available": false,
5511
+ "framework_control_gaps": {
5512
+ "NIST-800-53-AC-6": "Least-privilege enforced at conventional Kubernetes RBAC layer; AI-platform overlay extends attack surface.",
5513
+ "FedRAMP-AC-3": "Access enforcement at API server assumed; OpenShift AI overlay introduces additional control plane.",
5514
+ "EU-AI-Act-Art15": "AI-platform deployment surface not enumerated in robustness controls.",
5515
+ "ISO-IEC-42001-AIMS-A.6.2.5": "AI lifecycle controls don't address managed-AI-platform tenant isolation."
5516
+ },
5517
+ "atlas_refs": [
5518
+ "AML.T0024"
5519
+ ],
5520
+ "attack_refs": [
5521
+ "T1068",
5522
+ "T1098.003"
5523
+ ],
5524
+ "rwep_factors": {
5525
+ "cisa_kev": 0,
5526
+ "poc_available": 0,
5527
+ "ai_factor": 15,
5528
+ "active_exploitation": 0,
5529
+ "blast_radius": 20,
5530
+ "patch_available": -15,
5531
+ "live_patch_available": 0,
5532
+ "reboot_required": 0
5533
+ },
5534
+ "rwep_score": 20,
5535
+ "verification_sources": [
5536
+ "https://zeropath.com/blog/cve-2025-10725-redhat-openshift-ai-privilege-escalation",
5537
+ "https://access.redhat.com/security/cve/CVE-2025-10725",
5538
+ "https://nvd.nist.gov/vuln/detail/CVE-2025-10725"
5539
+ ],
5540
+ "source_verified": "2026-05-18",
5541
+ "last_updated": "2026-05-18",
5542
+ "vendor_advisories": [
5543
+ {
5544
+ "vendor": "Red Hat",
5545
+ "advisory_id": null,
5546
+ "url": "https://access.redhat.com/security/cve/CVE-2025-10725",
5547
+ "severity": "high",
5548
+ "published_date": "2025-09-29"
5549
+ }
5550
+ ],
5551
+ "discovery_attribution_note": "AI-surfaced by ZeroPath against Red Hat OpenShift AI. Hard Rule #7 anchor — AI-defender finding bugs in AI-deployment platform.",
5552
+ "live_patch_tools": []
5553
+ },
5554
+ "MAL-2025-AI-FOUND-FFMPEG-BIGSLEEP": {
5555
+ "id": "MAL-2025-AI-FOUND-FFMPEG-BIGSLEEP",
5556
+ "name": "Big Sleep AI Open-Source 20-Vulnerability Disclosure Tranche (FFmpeg + ImageMagick + others)",
5557
+ "type": "ai-discovered-tranche-multi-cve",
5558
+ "cvss_score": 7.5,
5559
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
5560
+ "cvss_correction_note": "Composite entry covering the August 2025 Big Sleep tranche. Individual CVE-level CVSS varies; representative high-severity media-decoder bug used as anchor. Per-CVE detail still being published by Google as the tranche disclosure unfolds.",
5561
+ "cisa_kev": false,
5562
+ "cisa_kev_date": null,
5563
+ "poc_available": false,
5564
+ "poc_description": "Pre-emptive AI-agent discovery; no public PoCs at disclosure time. Bugs reported through standard upstream-vendor responsible-disclosure channels with patches landing before public PoC publication.",
5565
+ "ai_discovered": true,
5566
+ "ai_discovery_source": "vendor_research",
5567
+ "ai_discovery_date": "2025-08-04",
5568
+ "ai_discovery_notes": "Google DeepMind + Project Zero 'Big Sleep' AI agent (Gemini-backed) reported the first 20 vulnerabilities it found, disclosed publicly by Heather Adkins on 2025-08-04. Targets included FFmpeg media library and ImageMagick editing suite — both with massive downstream redistribution surface.",
5569
+ "ai_assisted_weaponization": false,
5570
+ "active_exploitation": "none",
5571
+ "affected": "FFmpeg, ImageMagick, and other open-source media / utility libraries enumerated in the Big Sleep August 2025 tranche.",
5572
+ "affected_versions": [
5573
+ "ffmpeg pre-tranche-fix",
5574
+ "imagemagick pre-tranche-fix"
5575
+ ],
5576
+ "vector": "Varies per CVE in tranche; representative path is memory-corruption in media-decoder triggered by crafted file processed via library API.",
5577
+ "patch_available": true,
5578
+ "patch_required_reboot": false,
5579
+ "live_patch_available": false,
5580
+ "framework_control_gaps": {
5581
+ "NIST-800-218-SSDF-PW.7.1": "Code review by automated tools — frameworks lack specific 'AI-discovery' attribution model.",
5582
+ "EU-AI-Act-Art15": "Framework does not enumerate AI-as-defender contribution to robustness control.",
5583
+ "ISO-IEC-42001-AIMS": "AI Management System silent on AI-vulnerability-discovery as a positive control surface.",
5584
+ "OWASP-SAMM-Code-Review": "AI-tooling not enumerated as a SAMM code-review modality."
5585
+ },
5586
+ "atlas_refs": [
5587
+ "AML.T0024"
5588
+ ],
5589
+ "attack_refs": [
5590
+ "T1190",
5591
+ "T1203"
5592
+ ],
5593
+ "rwep_factors": {
5594
+ "cisa_kev": 0,
5595
+ "poc_available": 0,
5596
+ "ai_factor": 15,
5597
+ "active_exploitation": 0,
5598
+ "blast_radius": 20,
5599
+ "patch_available": -15,
5600
+ "live_patch_available": 0,
5601
+ "reboot_required": 0
5602
+ },
5603
+ "rwep_score": 20,
5604
+ "verification_sources": [
5605
+ "https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap",
5606
+ "https://blog.google/innovation-and-ai/technology/safety-security/cybersecurity-updates-summer-2025/",
5607
+ "https://winbuzzer.com/2025/08/05/googles-big-sleep-ai-agent-finds-20-new-open-source-vulnerabilities-xcxwbn/"
5608
+ ],
5609
+ "source_verified": "2026-05-18",
5610
+ "last_updated": "2026-05-18",
5611
+ "vendor_advisories": [
5612
+ {
5613
+ "vendor": "Google (Big Sleep)",
5614
+ "advisory_id": null,
5615
+ "url": "https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap",
5616
+ "severity": "informational",
5617
+ "published_date": "2025-08-04"
5618
+ }
5619
+ ],
5620
+ "discovery_attribution_note": "Composite / tranche entry covering the Big Sleep FFmpeg + ImageMagick AI-tool zero-day finds (Google DeepMind + Project Zero). Operator action: when the per-CVE detail becomes available, split this into individual catalog entries and retire the composite. Anchor entry for Hard Rule #7 (AI-discovery rate).",
5621
+ "live_patch_tools": []
3660
5622
  }
3661
5623
  }